Cracking drupal

The book

A few months ago I read . It is a good book if you want to understand what the vulnerabilities of your drupal site are. 

In a certain chapter  talks about security in the API. He explains what the is all about. How you can use it when you need to append variables to your message.


The real-life example

Well a few weeks ago I stumbled upon this piece of code: 

This caught my eye and an alarm bell went off. This is how you make your site vulnerable to attacks. What is wrong with this code? Well, two things:

  • You are translating only a part of your output.
  • You are appending user input (the firstname of a user) without sanitizing the data.

So what do you need to do in this case? You have to know that the t() function works with placeholders for variables. If you use the function with the placeholders, the values passed along will be run through the  function before they are used in the message you want to display.

In this case the right code would be:

 t('Welcome %firstname', array('%firstname' => $user->firstname));

Besides, working with placeholders makes it easier to translate. Especially when words have to switch places when translating. 






Leave a Reply

Your email address will not be published. Required fields are marked *