[web2py] Re: Edit in place vulnerable to injection attack?

2011-06-18 Thread Massimo Di Pierro
There are two types of injections attacks and they are mixed up in this thread. - SQL Injection. DAL prevents those. Period. (unless you are on old version of postgresql) - XSS Injections. {{=anything}} prevents those. Caveats about XSS. If you use a WYSIWYG/HTML editor you are forced to do {{=X

[web2py] Re: edit in place

2011-06-18 Thread weheh
Y On Jun 18, 1:51 pm, Anthony wrote: > Unless you're writing you're own raw SQL, I think the DAL is supposed to > protect against SQL injection attacks. And if you're returning code to any > views, the template engine should escape it properly before rendering. Have > you successfully executed an

[web2py] Re: edit in place

2011-06-18 Thread Anthony
Unless you're writing you're own raw SQL, I think the DAL is supposed to protect against SQL injection attacks. And if you're returning code to any views, the template engine should escape it properly before rendering. Have you successfully executed an actual attack? On Saturday, June 18, 2011