Closed GoogleCodeExporter closed 9 years ago
"Steps could be taken to ensure that the SQL is indeed coming from SQL
Buddy and not from rogue javascript. Maybe using a hash of the logged in
username+password could differentiate valid SQL Buddy javascript from XSS
javascript."
This is already implemented. Look at this code in functions.php:
$requestKey = substr(sha1(session_id() . $_SERVER["DOCUMENT_ROOT"]), 0, 16);
This request key is sent to the browser as a javascript variable. Every Ajax
call must pass along the request key as a parameter or it
will not be executed. If the request key doesn't match, the request is
immediately killed. No further code will get executed.
Technically an attack is possible, but it would have to read the request key
from the javascript variable and provide it along with the
request to ajaxquery.php.
Another thing that makes ajax slightly more secure is that only $_POST is used
to receive queries from javascript. This would make
XSS attacks slightly more difficult.
Original comment by calvinlo...@gmail.com
on 31 Aug 2008 at 7:26
OK, lets hope these are enough! Although a really determined person could
overcome
all these obstacles (always true after all)
Original comment by dare...@gmail.com
on 31 Aug 2008 at 8:41
Original issue reported on code.google.com by
dare...@gmail.com
on 31 Aug 2008 at 11:14