![]() |
11-02-2021, 03:57 AM
(This post was last modified: 11-02-2021, 04:01 AM by captain-sensible. Edit Reason: inform web down )
I have a web site i'm working on set up in Apache local host, with virtual host etc so that the url to serve the landing page is:127.0.0.2
now there is a useful program from owasp called zap. You can use that program to attack webs even on local host, to see what issues are brought up. now I got this output: Code: SQL Injection The route I set up is : Code: $routes->get('displayGallery','Gallery::displayGallery'); The relevant section of that controller class is: Code: $handle = new GalleryModel(); and the section of GalleryModel is: Code: class GalleryModel extends Model So in summary i'm think i'm following reasonable coding in that I use CI4 model and what it provides to paginate results. The pagination by the way works perfectly. Now I always thought that SQL injection was a problem , where there was an input field and that whats entered would find its way to a database. Now i think i also read. Probably its a good idea to avoid GET requests as much as possible since , it involves a url , and somebody can play with that. My overall thinking is that since the pagination simply retrieves data and there is no input field , this is a false posative. I thought it prudent to find out what other people think ? ps 11.01 am Uk time : Code: Internal Server Error |
Messages In This Thread |
Security and paginate - by captain-sensible - 11-02-2021, 03:57 AM
RE: Security and paginate - by includebeer - 11-02-2021, 04:38 PM
RE: Security and paginate - by kenjis - 11-05-2021, 06:10 AM
RE: Security and paginate - by kenjis - 11-02-2021, 09:11 PM
RE: Security and paginate - by captain-sensible - 11-04-2021, 09:28 AM
RE: Security and paginate - by salain - 11-03-2021, 01:08 AM
RE: Security and paginate - by kenjis - 11-03-2021, 01:17 AM
RE: Security and paginate - by includebeer - 11-05-2021, 02:29 PM
|