Subject: | CatalystX::CRUD::Model::Utils make_sql_query SQL injection |
Hi!
The CatalystX::CRUD::Model::Utils->make_sql_query is vulnerable for
SQL injections. The query parameters aren't filtered properly.
Example:
Call your CatalystX::CRUD::Controller with this url
http://hirnlego:3000/list?cxc-order=name%20id%3bdrop%0dtable%0dtest%0d%3bselect%0d1%0d--
will drop table 'test' from your DB.