Possible SQL injection attacks #205

Open
opened 2022-05-29 21:43:11 +02:00 by Jef Roosens · 2 comments

The new filtering code for the GitRepo & BuildLog could potentially allow for sql injection. Therefore, I want to make sure all inputs are sanitized.

The new filtering code for the GitRepo & BuildLog could potentially allow for sql injection. Therefore, I want to make sure all inputs are sanitized.
Jef Roosens added this to the 0.3.0 milestone 2022-05-29 21:43:11 +02:00
Jef Roosens added the
enhancement
label 2022-05-29 21:43:11 +02:00
Jef Roosens changed title from Investigate possible SQL injection attack surfaces to Possible SQL injection attacks 2022-06-13 22:28:56 +02:00
Jef Roosens removed this from the 0.3.0 milestone 2022-06-13 22:28:59 +02:00
Jef Roosens added
bug
and removed
enhancement
labels 2022-06-13 22:29:04 +02:00

So basically any argument that accepts an arbitrary string currently allows for SQL injection attacks.

So basically any argument that accepts an arbitrary string currently allows for SQL injection attacks.

This should be fixed by #283.

This should be fixed by #283.
Jef Roosens added this to the 0.5.0 milestone 2022-11-02 08:40:55 +01:00
Jef Roosens added this to the (deleted) project 2022-11-02 08:40:57 +01:00
Jef Roosens removed this from the 0.5.0 milestone 2022-12-14 18:50:37 +01:00
Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: vieter-v/vieter#205
There is no content yet.