Template:Execution alert: Difference between revisions
From Bonkipedia
[[mw:]]>Shirayuki (use translation aware transclusion) |
ManfredoDo (talk | contribs) m (1 revision imported: Template documentation pages) |
(No difference)
|
Latest revision as of 18:03, 12 November 2022
<translate> Warning:</translate> <translate> The code or configuration described here poses a major security risk.</translate> <translate> Site administrators:</translate> <translate> You are advised against using it until this security issue is resolved.</translate> <translate> Problem:</translate> Vulnerable to code injection attacks, because it passes user input directly to executable statements, such as exec(), passthru() or include(). This may lead to arbitrary code being run on your server, among other things. <translate> Solution:</translate> Strictly validate user input and/or apply escaping to all characters that have a special meaning in executable statements. |
Template documentation
- Description
- Adds an alert box describing a code injection vulnerability in including Extension page. Also adds including page to Category:Extensions with arbitrary execution vulnerabilities
- Example
{{Execution alert|~~~~}}