Possible SQL injection attacks #205

Open
opened 2022-05-29 21:43:11 +02:00 by Jef Roosens · 2 comments
Owner

The new filtering code for the GitRepo & BuildLog could potentially allow for sql injection. Therefore, I want to make sure all inputs are sanitized.

The new filtering code for the GitRepo & BuildLog could potentially allow for sql injection. Therefore, I want to make sure all inputs are sanitized.
Jef Roosens added this to the 0.3.0 milestone 2022-05-29 21:43:11 +02:00
Jef Roosens added the
enhancement
label 2022-05-29 21:43:11 +02:00
Jef Roosens changed title from Investigate possible SQL injection attack surfaces to Possible SQL injection attacks 2022-06-13 22:28:56 +02:00
Jef Roosens removed this from the 0.3.0 milestone 2022-06-13 22:28:59 +02:00
Jef Roosens added
bug
and removed
enhancement
labels 2022-06-13 22:29:04 +02:00
Author
Owner

So basically any argument that accepts an arbitrary string currently allows for SQL injection attacks.

So basically any argument that accepts an arbitrary string currently allows for SQL injection attacks.
Author
Owner

This should be fixed by #283.

This should be fixed by #283.
Jef Roosens added this to the 0.5.0 milestone 2022-11-02 08:40:55 +01:00
Jef Roosens added this to the (deleted) project 2022-11-02 08:40:57 +01:00
Jef Roosens removed this from the 0.5.0 milestone 2022-12-14 18:50:37 +01:00
This repository is archived. You cannot comment on issues.
No milestone
No project
No assignees
1 participant
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: vieter-v/vieter#205
No description provided.