woda team mailing list archive
-
woda team
-
Mailing list archive
-
Message #00000
Re: WODA bug
Hello Claudio
Do you remember this email ?
This bug and some others happened because Ziga has removed part of code from
the "pro" version to the normal one.
As you know, the bug is located in sub evalTrouble which is called by sub
evalSafe, called itself by sub wbParseSearch.
The code for evalTrouble has allways been:
# returns '' if ok
sub evalTrouble {
local ($_) = $_[0];
return '';
}
As you see, searches never end into troubles!
That is because Ziga has (accidentally ?) permanently hide a piece of the code
in that sub. Very basicaly, this removed code authorized only some perl
instructions (white list).
I plan to release the pro files in a week or so - merging versions is not so
easy.
But in another email you've said
Le mercredi 30 avril 2008 08:57:39, vous avez écrit :
>some times it may be useful to search for a fake field so I think that
>double quoting the string inside the {} is still the best solution. The only
>dirty solution is filtering out the ';' but I don't know how to get around it.
I would like to know about that double quoted string you were talking about?
or another solution you've found? It could help, because Ziga's solution is
not so secure if one doesn't setup databases like the "pro" version like them.
best regards
xavier
Le samedi 26 avril 2008 09:02:36, vous avez écrit :
> Hi guys,
>
> there is a major security issue in woda:
> try searching for: {system("ls")}
> in a woda web sites!
>
> claudio
Xavier
xavier@xxxxxxxxxxxxxx