Difference between revisions of "Template:Code injection alert"

From RobotX
Jump to navigation Jump to search
m (Text replacement - "</translate>" to "")
m (Text replacement - "<!--T:(.*)-->" to "")
Line 4: Line 4:
 
| =
 
| =
 
{{Security alert
 
{{Security alert
|problem={{{problem|<!--T:1--> Vulnerable to '''[[w:Code injection|code injection]] attacks'''. <!--T:2--> This may lead to '''compromisation of your entire wiki''', '''severe data loss''', '''malware being injected''', and '''other parts of your server being compromised''', among other things.}}}
+
|problem={{{problem| Vulnerable to '''[[w:Code injection|code injection]] attacks'''. This may lead to '''compromisation of your entire wiki''', '''severe data loss''', '''malware being injected''', and '''other parts of your server being compromised''', among other things.}}}
|solution={{{solution|<!--T:3--> [[w:Code injection|avoid the use of things like eval(), create_function(), and /e]]}}}
+
|solution={{{solution| [[w:Code injection|avoid the use of things like eval(), create_function(), and /e]]}}}
 
|signed={{{signed|{{{1||}}}}}}
 
|signed={{{signed|{{{1||}}}}}}
 
|nocat=1
 
|nocat=1

Revision as of 14:32, 21 December 2019


Template documentation[create]
Template documentation
Description
Adds an alert box describing a code injection vulnerability in including Extension page. Also adds including page to Category:Extensions with code injection vulnerabilities
If your extension was tagged with this template please read
Example
{{Code injection alert|~~~~}}
Creates
Template documentation[create]