Hi,
I am a big fan of mobile joomla and I run it on my company's site. However when performing pen testing on the site I found one of the plugin files:
to make it susceptible to SQL injection. This comes because of its error hadnling I will post the errors here but I will prefix the disclosure as
Based on your coding system could you help me debug this file so that it throws exceptions that don't reveal this kind of information. Thanks in advance
I am a big fan of mobile joomla and I run it on my company's site. However when performing pen testing on the site I found one of the plugin files:
plugins/mobile/terawurfl/DatabaseConnectors/TeraWurflDatabase_MySQL5.php
to make it susceptible to SQL injection. This comes because of its error hadnling I will post the errors here but I will prefix the disclosure as
storage path
<b>Warning</b>: mysqli::real_escape_string() [<a href='mysqli.real-escape-string'>mysqli.real-escape-string</a>]: Couldn't fetch mysqli in <b>Storagepath/plugins/mobile/terawurfl/DatabaseConnectors/TeraWurflDatabase_MySQL5.php</b> on line <b>537</b><br />
<b>Warning</b>: mysqli::query() [<a href='mysqli.query'>mysqli.query</a>]: Couldn't fetch mysqli in <b>Storagepath/plugins/mobile/terawurfl/DatabaseConnectors/TeraWurflDatabase_MySQL5.php</b> on line <b>353</b><br />
Based on your coding system could you help me debug this file so that it throws exceptions that don't reveal this kind of information. Thanks in advance
<b>Warning</b>: TeraWurflDatabase_MySQL5::getDeviceFromCache() [<a href='terawurfldatabase-mysql5.getdevicefromcache'>terawurfldatabase-mysql5.getdevicefromcache</a>]: Couldn't fetch mysqli in <b>Storagepath/plugins/mobile/terawurfl/DatabaseConnectors/TeraWurflDatabase_MySQL5.php</b> on line <b>354</b><br />