Subject: | SQL injection possible |
I didn't actually tried this package, but skimming over the source code
I would say that it is prone for SQL injection attacks, because it
embedds HTTP parameter values directly into SQL code.
Moreover code like this
foreach ( keys %{ $c->request->params } ) {
...
$searches->{$_} = { like => q{%} . $c->request->params->{$_} . q{%} };
}
fails, if $c->request->params->{$_} is an array reference, which happens
when a HTTP key is used more than once:
?term=x&term=y