<pebble $expression>
<sink:expression --htmldecode><trace --output $env></sink>
<pebble $expression>
In this case, there's not much of a security risk, since you are providing the string to evaluate. But consider:
<form>
<textarea name="expression" nrows="10" cols="60">
<var $input.expression>
</textarea>
</form>
<if $input.expression>
<pre>
<pebble $input.expression>
</pre>
</if>
Allowing execution of arbitrary Bedrock statements is not something you probably want to do.
<textarea name="expression" nrows="10" cols="60">
<var $input.expression>
</textarea>
</form>
<if $input.expression>
<pre>
<pebble $input.expression>
</pre>
</if>
Allowing execution of arbitrary Bedrock statements is not something you probably want to do.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.