salesagility / SuiteCRM

SuiteCRM - Open source CRM for the world
https://www.suitecrm.com
GNU Affero General Public License v3.0
4.5k stars 2.09k forks source link

Possible opportunity for SQL injection attack in file modules/Emails/EmailUIAjax.php #3688

Closed muratyaman closed 7 years ago

muratyaman commented 7 years ago

inside: case "getTemplateAttachments":

line: $where = "parent_id='{$_REQUEST['parent_id']}'";

All user inputs must be used after validation/sanitisation/escaping in SQL commands. Refer to usage of DBManager::quote() function

chris001 commented 7 years ago

You're absolutely right @muratyaman

samus-aran commented 7 years ago

Thanks @muratyaman - Looks like that has been there since sugar days but that's no excuse. We have announced within the forums that we are currently addressing the absent of tools and automated testing in dedicated sprints in the 7.10 development cycle which will introduce and put into place the most suitable tools for the team and the community along with processes. Regards to raising security issues - we have updated the security process very recently so please see the wiki (the README will be updated upon release) for the email to send to going forward.

Just on a last note we are a relatively small product team and we appreciate all the help that the community provides, but if you and other members can understand that we are not a 20 man team and we can only do things when we are able to. So that being said when this version has reached a stable release then we can address the open PRs that focus on improving the code quality:that is our highest to do after this 7.9 release.