From 97f6efb079c695654df6d2bddc0c2914e6419cda Mon Sep 17 00:00:00 2001 From: Laurent Destailleur Date: Thu, 26 Nov 2020 23:50:00 +0100 Subject: [PATCH] Fix avoid to trigger sql injection detection --- htdocs/core/class/html.form.class.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/htdocs/core/class/html.form.class.php b/htdocs/core/class/html.form.class.php index a3b339e96ac..d56ba9bdf62 100644 --- a/htdocs/core/class/html.form.class.php +++ b/htdocs/core/class/html.form.class.php @@ -6594,7 +6594,7 @@ class Form var separ = urlBase.indexOf("?") >= 0 ? "&" : "?"; /* console.log("params.term="+params.term); */ /* console.log("params.term encoded="+encodeURIComponent(params.term)); */ - saveRemoteData[data.id].url = urlBase + separ + "sall=" + encodeURIComponent(params.term);'; + saveRemoteData[data.id].url = urlBase + separ + "sall=" + encodeURIComponent(params.term.replace(/\"/g, ""));'; } if (!$disableFiltering) { @@ -6625,7 +6625,7 @@ class Form $.each( saveRemoteData, function( key, value ) { if (key == selected) { - console.log("selectArrayAjax - Do a redirect to "+value.url) + console.log("selectArrayFilter - Do a redirect to "+value.url) location.assign(value.url); } });