This repository has been archived by the owner on Dec 13, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 240
fix(secu): Avoid SQL injections in multiple monitoring pages - for master #8063
Merged
sc979
merged 20 commits into
master
from
MON-4422-fix-master-sql-injections-in-monitoring-pages
Nov 12, 2019
Merged
fix(secu): Avoid SQL injections in multiple monitoring pages - for master #8063
sc979
merged 20 commits into
master
from
MON-4422-fix-master-sql-injections-in-monitoring-pages
Nov 12, 2019
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
16 tasks
sc979
force-pushed
the
MON-4422-fix-master-sql-injections-in-monitoring-pages
branch
6 times, most recently
from
November 4, 2019 08:10
e567a41
to
c53e78e
Compare
sc979
force-pushed
the
MON-4422-fix-master-sql-injections-in-monitoring-pages
branch
from
November 6, 2019 10:14
c53e78e
to
9f431db
Compare
callapa
suggested changes
Nov 6, 2019
www/include/monitoring/status/Services/xml/makeXMLForOneService.php
Outdated
Show resolved
Hide resolved
callapa
approved these changes
Nov 7, 2019
jdelpierre
approved these changes
Nov 8, 2019
sc979
force-pushed
the
MON-4422-fix-master-sql-injections-in-monitoring-pages
branch
from
November 8, 2019 12:32
c022ce8
to
5b76133
Compare
…ummary XML (#8064) * fix(secu): remove or sanitize unused https arguments in service by servicegroup summary * Update www/include/monitoring/status/ServicesServiceGroups/xml/serviceSummaryBySGXML.php
* fix(secu): avoid SQL injection in serviceByServicegroupGridXML.php file * fix(secu): avoid SQL injection in serviceByServicegroupSummaryXML.php file * fix(secu): remove or sanitize unused https arguments in service by servicegroup GRID (#8066)
…es (#8074) * fix(secu): sanitize or remove unused params in serviceSummaryBYHGXML file * fix(secu): sanitize or remove unused params in serviceGridBYHGXML file
* style * fix(secu): remove unused http parameters in hostgroupXML.php file
* fix(secu): sanitize makeXMLForOneHost.php * fix(secu): sanitize makeXMLForOneService.php * fix(secu): better hadling session check * fix(secu): sanitize or remove unused params in serviceXML file * fix(secu): sanitize serviceGridXML.php * fix(secu): sanitize serviceSummaryXML.php
* style * fix(secu): sanitize or remove unused params in hostXML file
* prevent sql injection in hostXML.php * replace uppercase table alias by lowercase * delete case duplicating the default case * style * replace array() with []
* www/include/monitoring/status/Common/xml/modelXML.php * correct variable
* prevent sql injection in makeXMLForOneHostXML.php * prevent sql injection in makeXMLForOneServiceXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceGridXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceSummaryXML.php * remove debug and prepare second query * style
* fix(secu): avoid sql injections in hostgroupXML file * fix(UI): add the order param to the request * remove useless declarations
Co-Authored-By: Laurent Calvet <lcalvet@centreon.com>
sc979
force-pushed
the
MON-4422-fix-master-sql-injections-in-monitoring-pages
branch
from
November 12, 2019 08:48
5779c17
to
aa4bda8
Compare
sc979
deleted the
MON-4422-fix-master-sql-injections-in-monitoring-pages
branch
November 12, 2019 12:01
sc979
added a commit
that referenced
this pull request
Nov 12, 2019
…ster (#8063) * fix(secu): remove unused topCounter files and folders (#8007) * fix(secu): remove unused http parameters in service by servicegroup summary XML (#8064) * fix(secu): remove or sanitize unused https arguments in service by servicegroup summary * fix(secu): Avoid SQL injections in service by servicegroup pages (#8065) * fix(secu): avoid SQL injection in serviceByServicegroupGridXML.php file * fix(secu): avoid SQL injection in serviceByServicegroupSummaryXML.php file * fix(secu): remove or sanitize unused https arguments in service by servicegroup GRID (#8066) * fix(secu): remove unused http parameters in services by hostgroup files (#8074) * fix(secu): sanitize or remove unused params in serviceSummaryBYHGXML file * fix(secu): sanitize or remove unused params in serviceGridBYHGXML file * fix(secu): remove unused http parameters in hostgroup xml.php (#8073) * fix(secu): remove unused http parameters in hostgroupXML.php file * fix(secu): remove unused http parameters in services files (#8078) * fix(secu): sanitize makeXMLForOneHost.php * fix(secu): sanitize makeXMLForOneService.php * fix(secu): better hadling session check * fix(secu): sanitize or remove unused params in serviceXML file * fix(secu): sanitize serviceGridXML.php * fix(secu): sanitize serviceSummaryXML.php * fix(secu): remove unused http parameters in hostXML file (#8079) * fix(secu): sanitize or remove unused params in hostXML file * fix(secu): prevent from sql injections in host page (#8087) * prevent sql injection in hostXML.php * replace uppercase table alias by lowercase * delete case duplicating the default case * replace array() with [] * fix(secu): prevent from sql injections from common xml model (#8083) * fix(secu): prevent from sql injections in services pages (#8082) * prevent sql injection in makeXMLForOneHostXML.php * prevent sql injection in makeXMLForOneServiceXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceGridXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceSummaryXML.php * remove debug and prepare second query * fix(secu): prevent from sql injections in hostgroupXML file (#8081) * fix(secu): avoid sql injections in hostgroupXML file * fix(UI): add the order param to the request * remove useless declarations * replace regexp with whitelist * add missing array declaration * fix(CI): sonar coding style issue
sc979
added a commit
that referenced
this pull request
Nov 12, 2019
…ster (#8063) * fix(secu): remove unused topCounter files and folders (#8007) * fix(secu): remove unused http parameters in service by servicegroup summary XML (#8064) * fix(secu): remove or sanitize unused https arguments in service by servicegroup summary * fix(secu): Avoid SQL injections in service by servicegroup pages (#8065) * fix(secu): avoid SQL injection in serviceByServicegroupGridXML.php file * fix(secu): avoid SQL injection in serviceByServicegroupSummaryXML.php file * fix(secu): remove or sanitize unused https arguments in service by servicegroup GRID (#8066) * fix(secu): remove unused http parameters in services by hostgroup files (#8074) * fix(secu): sanitize or remove unused params in serviceSummaryBYHGXML file * fix(secu): sanitize or remove unused params in serviceGridBYHGXML file * fix(secu): remove unused http parameters in hostgroup xml.php (#8073) * fix(secu): remove unused http parameters in hostgroupXML.php file * fix(secu): remove unused http parameters in services files (#8078) * fix(secu): sanitize makeXMLForOneHost.php * fix(secu): sanitize makeXMLForOneService.php * fix(secu): better hadling session check * fix(secu): sanitize or remove unused params in serviceXML file * fix(secu): sanitize serviceGridXML.php * fix(secu): sanitize serviceSummaryXML.php * fix(secu): remove unused http parameters in hostXML file (#8079) * fix(secu): sanitize or remove unused params in hostXML file * fix(secu): prevent from sql injections in host page (#8087) * prevent sql injection in hostXML.php * replace uppercase table alias by lowercase * delete case duplicating the default case * replace array() with [] * fix(secu): prevent from sql injections from common xml model (#8083) * fix(secu): prevent from sql injections in services pages (#8082) * prevent sql injection in makeXMLForOneHostXML.php * prevent sql injection in makeXMLForOneServiceXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceGridXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceSummaryXML.php * remove debug and prepare second query * fix(secu): prevent from sql injections in hostgroupXML file (#8081) * fix(secu): avoid sql injections in hostgroupXML file * fix(UI): add the order param to the request * remove useless declarations * replace regexp with whitelist * add missing array declaration * fix(CI): sonar coding style issue
sc979
added a commit
that referenced
this pull request
Nov 12, 2019
…ster (#8063) * fix(secu): remove unused topCounter files and folders (#8007) * fix(secu): remove unused http parameters in service by servicegroup summary XML (#8064) * fix(secu): remove or sanitize unused https arguments in service by servicegroup summary * fix(secu): Avoid SQL injections in service by servicegroup pages (#8065) * fix(secu): avoid SQL injection in serviceByServicegroupGridXML.php file * fix(secu): avoid SQL injection in serviceByServicegroupSummaryXML.php file * fix(secu): remove or sanitize unused https arguments in service by servicegroup GRID (#8066) * fix(secu): remove unused http parameters in services by hostgroup files (#8074) * fix(secu): sanitize or remove unused params in serviceSummaryBYHGXML file * fix(secu): sanitize or remove unused params in serviceGridBYHGXML file * fix(secu): remove unused http parameters in hostgroup xml.php (#8073) * fix(secu): remove unused http parameters in hostgroupXML.php file * fix(secu): remove unused http parameters in services files (#8078) * fix(secu): sanitize makeXMLForOneHost.php * fix(secu): sanitize makeXMLForOneService.php * fix(secu): better hadling session check * fix(secu): sanitize or remove unused params in serviceXML file * fix(secu): sanitize serviceGridXML.php * fix(secu): sanitize serviceSummaryXML.php * fix(secu): remove unused http parameters in hostXML file (#8079) * fix(secu): sanitize or remove unused params in hostXML file * fix(secu): prevent from sql injections in host page (#8087) * prevent sql injection in hostXML.php * replace uppercase table alias by lowercase * delete case duplicating the default case * replace array() with [] * fix(secu): prevent from sql injections from common xml model (#8083) * fix(secu): prevent from sql injections in services pages (#8082) * prevent sql injection in makeXMLForOneHostXML.php * prevent sql injection in makeXMLForOneServiceXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceGridXML.php * prevent sql injection in serviceXML.php * prevent sql injection in serviceSummaryXML.php * remove debug and prepare second query * fix(secu): prevent from sql injections in hostgroupXML file (#8081) * fix(secu): avoid sql injections in hostgroupXML file * fix(UI): add the order param to the request * remove useless declarations * replace regexp with whitelist * add missing array declaration * fix(CI): sonar coding style issue
CVE Id assigned about this security fix is CVE-2019-17647 |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request Template
Description
This PR concatenate multiples reviewed PR for PHP 7 branches
This concerns, security fixes to avoid SQL injections on unused http params (eg : $_GET) or inadequately protected variables in SQL requests.
https://github.com/centreon/centreon/pull/8007
https://github.com/centreon/centreon/pull/8064
https://github.com/centreon/centreon/pull/8065
https://github.com/centreon/centreon/pull/8066
https://github.com/centreon/centreon/pull/8073
https://github.com/centreon/centreon/pull/8074
https://github.com/centreon/centreon/pull/8078
https://github.com/centreon/centreon/pull/8079 -> CVE-2019-17647
https://github.com/centreon/centreon/pull/8081
https://github.com/centreon/centreon/pull/8082
https://github.com/centreon/centreon/pull/8083
https://github.com/centreon/centreon/pull/8087
Type of change
Target serie
How this pull request can be tested ?
please contact me.
Checklist
Community contributors & Centreon team
Centreon team only