Skip to content
This repository has been archived by the owner on Dec 13, 2022. It is now read-only.

fix(security): prepare query and execute it #5904

Merged
merged 2 commits into from
Nov 21, 2017

Conversation

Guillaume28
Copy link
Contributor

As the title said, prepare et execute the query to prevent SQL injection.

@Guillaume28
Copy link
Contributor Author

Don't accept it for the moment, small display problem.

@@ -252,7 +252,8 @@ function parseStatsFile($statfile)
. "FROM cfg_centreonbroker "
. "WHERE stats_activate='1' "
. "AND ns_nagios_server = " . CentreonDB::escape($selectedPoller) . " ";
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

remove php variable

@Guillaume28 Guillaume28 merged commit 912a805 into 2.8.x Nov 21, 2017
@thiuyendang
Copy link
Contributor

OK 2.8.17-4 (reproduced in 2.8.15)

@lpinsivy lpinsivy deleted the mon-2130-poller-statistics-vulnerability branch July 10, 2018 08:03
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants