-
Notifications
You must be signed in to change notification settings - Fork 0
New feature #74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
New feature #74
Conversation
|
🟡 Security issue(s) detected below the blocking threshold. Reviewed everything up to a605adb. Security Overview
Detected Code Changes
|
|
❌ Possible security or compliance issues detected. Reviewed everything up to a605adb. The following issues were found:
Security Overview
Detected Code Changes
|
af689b4 to
a605adb
Compare
| u.'.$conf['user_fields']['username'].' AS canonical_username | ||
| '.$from_clause.' | ||
| ORDER BY la.occurred_on DESC | ||
| LIMIT '.$per_page.' OFFSET '.$offset.' | ||
| ;'; | ||
| $result = pwg_query($query); | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SQL Injection Vulnerability in admin/security_center.php (Severity: MEDIUM)
A SQL injection vulnerability exists in admin/security_center.php, lines 210-216, potentially allowing unauthorized data access or modification. The vulnerability stems from the lack of validation of the extra_where parameter, which is directly incorporated into the SQL query. This can allow an attacker to inject malicious SQL code, leading to unintended database operations.
View details in ZeroPath
No description provided.