Hi,
I’ve had a site penetration tested and one piece of feedback was that SQL injection is possible via the entry_id query parameter from admin entry_form URLs.
For example:
http://{domain}/admin/index.php?/cp/content_publish/entry_form?channel_id=9&entry_id=70% 20AND% 20SLEEP% 281% 29
(remove SPACES and replace {domain})
Will issue a SLEEP command to SQL. You have to be logged in to perform this but anyone able to edit entries will be able to execute commands.
Is this worth raising as a bug and if so, any thoughts where I should start when creating a quick patch in the meantime, would be greatly appreciated?
Thanks