Hi
I found a vulnerbility in crashfix version 1.0.4.
code in function UserController.php:actionIndex will get parameter $_POST['User']
code in file \crashfix\protected\models\User.php search() function process model 'USER' with no filtered, and concat it into Sql query sentence to produce a SQL injection vulnerbility
if(isset($this->status)) $status = $this->status; if($status!=-1) $criteria->addCondition('t.status='.$status, 'AND');
hope you fix it.
thanks,
my email [ha@cker.in]