Book Image

Moodle 1.9 Extension Development

Book Image

Moodle 1.9 Extension Development

Overview of this book

Moodle gives you the power to create and customize feature-rich plug-ins. If you can write Moodle plug-ins, you can make it do just about anything. From making the site easier to administer, to new features, to completely changing the way it looks; plug-ins are the method Moodle offers to customize and extend its functionality. This book will show you how to build all sorts of Moodle plug-ins: admin plug-ins, Blocks, Activities, Grading components, Reports, Fliters that change the way your site works and looks. You will develop standard Moodle plug-ins such as Activities, Filters, and Blocks by creating functioning code that you can execute in your own Moodle installation. Writing modular plug-ins for Moodle will be a large focus of this book.This book will take you inside Moodle and provide you with the ability to develop code the “Moodle way”.This book will expose you to all of the core code functions in Moodle, in a progressive, understandable way. You will learn what libraries are available, what the API calls are, how it is structured and how it can be expanded beyond the plug-in system.You will begin by getting an understanding of the basic architecture that Moodle uses to operate in. Next you will build your first plug-in; a block. You will carry on building other Moodle plug-ins, gaining knowledge of the “Moodle way” of coding, before plunging deeper into the API and inner libraries. Lastly, you will learn how to integrate Moodle with other systems using a variety of methods.When you have completed, you will have a solid understanding of Moodle programming and knowledge of how to extend its functionality in whatever way you want.
Table of Contents (19 chapters)
Moodle 1.9 Extension Development
Credits
About the Authors
About the Reviewer
Preface

SQL issues


The biggest worry you have when dealing with SQL and your database queries is the risk of SQL injection.

SQL injection is an attack technique that tries to take advantage of an SQL query by inserting other unexpected queries into it. Typically, this is done by taking advantage of incorrectly-filtered string literals in a PHP, or other programming language, script.

Let's consider what this would mean if our code was insecure.

Taking a look at vulnerable code

Let's say we have a fictitious script that takes an integer value (representing a user ID value in a user data table) from a form or direct URL parameter, and uses it. For example:

http://[oursite]/processuser.php?userid=4

Now, let's say our script looked similar to the following (remember this is fictional; don't really do this! This is a big security hole!):

<?php
require_once('config.php');
$username = $_GET['username'];
$sql = "SELECT * FROM {$CFG->prefix}user WHERE username = $username";
$user = get_record_sql($sql...