Template:Execution alert
From Bonkipedia
Revision as of 06:03, 6 March 2021 by [[mw:]]>Shirayuki (use translation aware transclusion)
<translate> Warning:</translate> <translate> The code or configuration described here poses a major security risk.</translate> <translate> Site administrators:</translate> <translate> You are advised against using it until this security issue is resolved.</translate> <translate> Problem:</translate> Vulnerable to code injection attacks, because it passes user input directly to executable statements, such as exec(), passthru() or include(). This may lead to arbitrary code being run on your server, among other things. <translate> Solution:</translate> Strictly validate user input and/or apply escaping to all characters that have a special meaning in executable statements. |
Template documentation
- Description
- Adds an alert box describing a code injection vulnerability in including Extension page. Also adds including page to Category:Extensions with arbitrary execution vulnerabilities
- Example
{{Execution alert|~~~~}}