Joget DX 8 Stable Released
The stable release for Joget DX 8 is now available, with a focus on UX and Governance.
...
References:
...
crudMenu?id=changedValue
should be secured to prevent unauthorized access by manipulating the id
parameter. This can be achieved by configuring the permissions at the Form Builder to ensure that only authorized users can access or alter said forms.References:-
Examples:-
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
return "#form.TABLE_NAME.createdBy#".equals("#currentUser.username#"); |
...
Use Prepared Statements: To prevent SQL injection, use prepared statements. A prepared statement is a prepared statement is a precompiled SQL Query that can help prevent SQL injection attacks by ensuring that user input is treated as data, not executable code
Use the SQL escape parameter in Hash Variables: If the query is a hash variable, use the ?sql
escape parameter, which ensures the query is handled safely, and the data is processed properly by the server.
For example, in List Builder > Data Store > Database SQL Query
Code Block |
---|
SELECT * FROM dir_user WHERE username = '#requestParam.user?sql#' |
...