Remove SQL-injection vulnerable code in this file that was previously fixed in inc_all_client.php
This commit is contained in:
@@ -1,14 +1,11 @@
|
|||||||
<?php
|
<?php
|
||||||
|
|
||||||
|
// Default Column Sort by Filter
|
||||||
|
$sb = "document_name";
|
||||||
|
$o = "ASC";
|
||||||
|
|
||||||
require_once("inc_all_client.php");
|
require_once("inc_all_client.php");
|
||||||
|
|
||||||
// Sort by
|
|
||||||
if (!empty($_GET['sb'])) {
|
|
||||||
$sb = sanitizeInput($_GET['sb']);
|
|
||||||
} else {
|
|
||||||
$sb = "document_name";
|
|
||||||
}
|
|
||||||
|
|
||||||
// Search query SQL snippet
|
// Search query SQL snippet
|
||||||
if (!empty($q)) {
|
if (!empty($q)) {
|
||||||
$query_snippet = "AND (MATCH(document_content_raw) AGAINST ('$q') OR document_name LIKE '%$q%')";
|
$query_snippet = "AND (MATCH(document_content_raw) AGAINST ('$q') OR document_name LIKE '%$q%')";
|
||||||
|
|||||||
Reference in New Issue
Block a user