Please Log in or Create an account to join the conversation.
Please Log in or Create an account to join the conversation.
Please Log in or Create an account to join the conversation.
I guess so. I assume they just let you run PHP from the looks of it. As long as CB is already loaded before than or you load in CB API using the code provided in the linked tutorial then the PHP will behave as expected.Is your code also for the 'Script called on form process' ?
You can point them to this topic if you like, but it's not my responsibility to teach other developers about basic SQL injection vulnerabilities. Securing the current usage is a simple as using Joomla API to pull and filter the POST value. POST values should never be directly pushed to a query as they are unfiltered. If you want an example of how to inject and break your current usage to confirm this I can PM it to you, but I won't be posting any vulnerabilities here.Maybe it is good that you inform RSJoomla if this is a treath for other websites.
Please Log in or Create an account to join the conversation.