Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SQL injection security hole in the documentation example code #31

Open
cie opened this issue Jul 18, 2011 · 3 comments
Open

SQL injection security hole in the documentation example code #31

cie opened this issue Jul 18, 2011 · 3 comments

Comments

@cie
Copy link

cie commented Jul 18, 2011

Hi,

Sorry for the hair-splitting, I know that it's just an example, but just in case someone copies it, would you consider changing
items = Tweet.find(:all, :conditions => "text LIKE '%#{param(:term)}%'").
to something like
items = Tweet.find(:all, :conditions => ["text LIKE '%' || ? || '%'", param(:term)]).
or maybe
items = Tweet.where("text LIKE ?", "%#{param(:term)}%").
on http://apotomo.de/peters-guide-1.1/autocomplete.html in line 9 of app/cells/quick_search.rb
because its a security hole.

Cheers,
Bernát

p.s. Apotomo is awsome. It solved nearly all problems I currently had with rails. Many thanks :)

@apotonick
Copy link
Owner

Hi Bernát,

ouch! I'll fix that in the next screencast. Thanks man!

@cie
Copy link
Author

cie commented Jul 20, 2011

You're very welcome :) I'm glad to have helped a bit

@cie cie closed this as completed Jul 20, 2011
@cie cie reopened this Jul 20, 2011
@cie
Copy link
Author

cie commented Jul 20, 2011

oops cliked the wrong button:)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants