boinc/html
David Anderson aba8af3bc0 admin web: fix a bug and security vulnerability
In the "ops" web page showing results, the credit link was wrong.

The page for grepping logs allowed people to run arbitrary shell commands.
Use escapeshellcmd() to prevent this.

However: the Ops interface lets you type in arbitrary SQL,
which lets bad guys do all sorts of things.
So you need to protect access to Ops very strongly.

TODO: fix all vulnerabilities in ops/.
Get rid of the DB browsing features; use phpmysqladmin.
2017-05-11 21:14:15 -07:00
..
inc admin web: fix a bug and security vulnerability 2017-05-11 21:14:15 -07:00
languages/translations Locale: Update localization files [skip ci] 2017-03-20 15:15:54 +01:00
ops admin web: fix a bug and security vulnerability 2017-05-11 21:14:15 -07:00
project.sample Project creation: fix a couple of bugs 2017-03-06 11:35:00 -08:00
user web: fix PHP warnings in report-post page 2017-05-10 19:39:23 -07:00
Makefile.am html: 2014-06-03 09:25:20 +02:00