Changes
Template:Execution alert/hu (view source)
Revision as of 15:00, 28 September 2019
, 15:00, 28 September 2019Updating to match new version of source page
<noinclude>
<languages/>
</noinclude>{{#switch:
| =
{{Security alert
|problem={{{problem|Vulnerable to '''[[w:Code_injection#Shell_injection|code injection]] attacks''', because it passes user input directly to executable statements, such as exec(), passthru() or include(). This may lead to '''arbitrary code being run on your server''', among other things.}}}
|solution={{{solution|Strictly validate user input and/or apply escaping to all characters that have a special meaning in executable statements.}}}
|signed={{{signed|{{{1||}}}}}}
|nocat=1
}}{{#if:{{{nocat|}}}||<includeonly>[[Category:Extensions with arbitrary execution vulnerabilities{{#translation:}}]]</includeonly>}}
| #default=
{{#invoke:Template translation|renderTranslatedTemplate|template=Template:Execution alert|noshift=1}}
}}<noinclude>
{{Documentation|content=
;Description
: Adds an alert box describing a [[w:Code_injection#Shell_injection|code injection]] vulnerability in including Extension page. Also adds including page to [[:Category:Extensions with arbitrary execution vulnerabilities]]
;Example
:<pre>{{Execution alert|~~~~}}</pre>
}}
[[Category:Alert templates{{#translation:}}|{{PAGENAME}}]]
[[Category:Categorizing templates{{#translation:}}|{{PAGENAME}}]]
[[Category:Extension templates{{#translation:}}|{{PAGENAME}}]]
</noinclude>
<languages/>
</noinclude>{{#switch:
| =
{{Security alert
|problem={{{problem|Vulnerable to '''[[w:Code_injection#Shell_injection|code injection]] attacks''', because it passes user input directly to executable statements, such as exec(), passthru() or include(). This may lead to '''arbitrary code being run on your server''', among other things.}}}
|solution={{{solution|Strictly validate user input and/or apply escaping to all characters that have a special meaning in executable statements.}}}
|signed={{{signed|{{{1||}}}}}}
|nocat=1
}}{{#if:{{{nocat|}}}||<includeonly>[[Category:Extensions with arbitrary execution vulnerabilities{{#translation:}}]]</includeonly>}}
| #default=
{{#invoke:Template translation|renderTranslatedTemplate|template=Template:Execution alert|noshift=1}}
}}<noinclude>
{{Documentation|content=
;Description
: Adds an alert box describing a [[w:Code_injection#Shell_injection|code injection]] vulnerability in including Extension page. Also adds including page to [[:Category:Extensions with arbitrary execution vulnerabilities]]
;Example
:<pre>{{Execution alert|~~~~}}</pre>
}}
[[Category:Alert templates{{#translation:}}|{{PAGENAME}}]]
[[Category:Categorizing templates{{#translation:}}|{{PAGENAME}}]]
[[Category:Extension templates{{#translation:}}|{{PAGENAME}}]]
</noinclude>