Bug 17900: Fix possible SQL injection in patron cards template editing
authorJonathan Druart <jonathan.druart@bugs.koha-community.org>
Fri, 13 Jan 2017 16:43:25 +0000 (17:43 +0100)
committerJulian Maurice <julian.maurice@biblibre.com>
Mon, 30 Jan 2017 15:25:01 +0000 (16:25 +0100)
commitb5b633b9eb4678193152bac4cb18778d1e127566
treef4dff4cab07c3bca6258ba7526ecaa1079e29857
parent23d3ca374fe2940ba016612f41310b539ce4e0c8
Bug 17900: Fix possible SQL injection in patron cards template editing

To recreate:
/cgi-bin/koha/patroncards/edit-template.pl?op=edit&element_id=23%20and%201%3d2+union+all+select+1,user(),@@version+--%20

Look at the Profile dropdown list.

To fix this problem and to make sure it does not appears anywhere else
in the label and patroncards modules, I have refactored the way the
queries are built in C4::Creators::Lib
Now all of the subroutine takes a hashref in parameters with a 'fields'
and 'filters' parameters.
From these 2 parameters the new internal subroutine _build_query will
build the query and use placeholders.

Test plan:
1/ Make sure you do not recreate the vulnerability with this patch
applied.
2/ With decent data in the labels and patroncards modules, compare all
the different view (undef the New and Manage button groups) with and
without this patch applied.
=> You should not see any differences.

This vulnerability has been reported by MDSec.

Signed-off-by: Chris Cormack <chris@bigballofwax.co.nz>
Signed-off-by: Marcel de Rooy <m.de.rooy@rijksmuseum.nl>
Signed-off-by: Kyle M Hall <kyle@bywatersolutions.com>
(cherry picked from commit a70980d8255a66c33539926796c06b29b26fbb40)
Signed-off-by: Julian Maurice <julian.maurice@biblibre.com>
C4/Creators/Lib.pm
labels/label-edit-profile.pl
labels/label-edit-template.pl
labels/label-manage.pl
labels/label-print.pl
patroncards/edit-profile.pl
patroncards/edit-template.pl
patroncards/manage.pl
patroncards/print.pl
t/db_dependent/Creators/Lib.t