I'm very curious and I'm pretty sure that I have a security hole, though I'm not really sure, you guys are awesome and I think you can help me with this, so I got this ajax:
$.ajax(
{
url: ...,
type: "post",
dataType: 'html',
data: {current_data:current_data, is_post:is_posted, by_count:by_champion_count, by_arrangement:by_data_arrange, by_date:by_data_date, by_string:by_data_string, sql_line:sql},
success: function(data)
{
...
}
});
I get these values(current_data, is_posted, etc...) with php(getting these really safe way), then in my file that ajax sends variables I'm getting more data from database with query, the question is, can this field:
data: {current_data:current_data, is_post:is_posted, by_count:by_champion_count, by_arrangement:by_data_arrange, by_date:by_data_date, by_string:by_data_string, sql_line:sql},
can this field(data) be overwritten by user, so he'd send fake data requests?
sql_line:sql