ExpressionEngine CMS
Open, Free, Amazing

Thread

This is an archived forum and the content is probably no longer relevant, but is provided here for posterity.

The active forums are here.

Web Security is a Three Edged Sword

May 15, 2009 6:14pm

Subscribe [13]
  • #16 / May 31, 2009 1:48pm

    ruraldreams

    279 posts

    On that note, if you are giving untrusted people access to your site or SFTP account, create a temporary user for them, restrict access as much as possible, and remove their account when done.

    I’d suggest that if you are giving ANYONE temporary access, even someone you trust, lock that person out when they are done.  When something DOES go wrong, you then don’t even have to suspect them if you’ve locked them out—and sadly sometimes an exploiter is someone you’ve trusted.  This includes access to SFTP, phpMyAdmin, and your EE CP.

  • #17 / May 31, 2009 10:09pm

    ladams1949

    100 posts

    Thanks.  My question was more in the direction of whether EE truly checks all built-in module inputs for SQL injection attacks? It seems implied, but just wanted to check. Thanks.

  • #18 / May 31, 2009 10:38pm

    Derek Jones

    7561 posts

    Thanks.  My question was more in the direction of whether EE truly checks all built-in module inputs for SQL injection attacks? It seems implied, but just wanted to check. Thanks.

    Yes, in first party code, validating input, escaping data before using in queries, and cross-site scripting attack prevention among other things are the standard de jour.

.(JavaScript must be enabled to view this email address)

ExpressionEngine News!

#eecms, #events, #releases