I think we all knew about this vulnerabilities... And if not, we have been
warned about them months ago...

But it is great that you fixed them.

Regards,


*Marcos García*

marcos...@gmail.com



2013/10/18 Doursenaud, Raphaël <rdoursen...@gpcsolutions.fr>

>
> 2013/10/17 Laurent Léonard <laur...@open-minds.org>
>
>> As specified at the end of the article you pointed, those vulnerabilities
>> are
>> fixed in Dolibarr 3.4.1:
>>
>
> It also says "However, their sanitization methods were not fixed, and no
> mention was made on a future patch.  Other SQLi vectors are likely." in the
> introduction.
>
> We should think about converting the source code to use parametrized
> queries. Maybe in a 4.0 branch ?
> What's your opinion ?
> --
> *Raphaël Doursenaud*
> 05 35 53 97 13 - 06 68 48 20 10
> rdoursen...@gpcsolutions.fr
>
>  <http://gpcsolutions.fr>
> http://gpcsolutions.fr
> Technopole Hélioparc
> 2 avenue du Président Pierre Angot
> 64053 PAU CEDEX 9
> SARL GPC.solutions au capital de 7 500 € - R.C.S. PAU 528 995 921
> <https://www.google.com/a/partnersearch/#partner?partner_id=46687933_a0n60000000sqpWAAQ><http://wiki.dolibarr.org/index.php/Dolibarr_suppliers_France#GPC.solutions>
>
> _______________________________________________
> Dolibarr-dev mailing list
> Dolibarr-dev@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/dolibarr-dev
>
>
_______________________________________________
Dolibarr-dev mailing list
Dolibarr-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/dolibarr-dev

Répondre à