On Fri, Oct 18, 2013 at 5:10 PM, Marcos García <marcos...@gmail.com> wrote:

> I think we all knew about this vulnerabilities... And if not, we have been
> warned about them months ago...
>
> But it is great that you fixed them.
>
>
But I hoever do not understand well if they are fixed or just they have a
temporary hact to prvent them , but as the text states which doesnt work in
all situations ?

Rgds
Saxa


> Regards,
>
>
> *Marcos García*
>
> marcos...@gmail.com
>
>
>
> 2013/10/18 Doursenaud, Raphaël <rdoursen...@gpcsolutions.fr>
>
>>
>> 2013/10/17 Laurent Léonard <laur...@open-minds.org>
>>
>>> As specified at the end of the article you pointed, those
>>> vulnerabilities are
>>> fixed in Dolibarr 3.4.1:
>>>
>>
>> It also says "However, their sanitization methods were not fixed, and no
>> mention was made on a future patch.  Other SQLi vectors are likely." in the
>> introduction.
>>
>> We should think about converting the source code to use parametrized
>> queries. Maybe in a 4.0 branch ?
>> What's your opinion ?
>> --
>> *Raphaël Doursenaud*
>> 05 35 53 97 13 - 06 68 48 20 10
>> rdoursen...@gpcsolutions.fr
>>
>>  <http://gpcsolutions.fr>
>> http://gpcsolutions.fr
>> Technopole Hélioparc
>> 2 avenue du Président Pierre Angot
>> 64053 PAU CEDEX 9
>> SARL GPC.solutions au capital de 7 500 € - R.C.S. PAU 528 995 921
>> <https://www.google.com/a/partnersearch/#partner?partner_id=46687933_a0n60000000sqpWAAQ><http://wiki.dolibarr.org/index.php/Dolibarr_suppliers_France#GPC.solutions>
>>
>> _______________________________________________
>> Dolibarr-dev mailing list
>> Dolibarr-dev@nongnu.org
>> https://lists.nongnu.org/mailman/listinfo/dolibarr-dev
>>
>>
>
> _______________________________________________
> Dolibarr-dev mailing list
> Dolibarr-dev@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/dolibarr-dev
>
>
_______________________________________________
Dolibarr-dev mailing list
Dolibarr-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/dolibarr-dev

Répondre à