I recently used this call for a module. But I'm not sure if that is safe enough as the variable is already used in a smarty call itself...thomahawk wrote:Now to the security!
I assume one could send anything with such a link, maybe some php injection?
Velden mentioned: "Note that using parameters (get or post) should be validated before actually using them (for security reasons)."
But now, how can I do that validation?
Code: Select all
{ModuleName param="/xxx/{$smarty.get.urlparam|regex_replace:'#[^a-zA-Z0-9/_\- ]#':''}"}