I know about SQL-Injection, but I do not see it here. Methods from list located inside code of JayData library http://jaydata.org/ and its developers have taken care of the safety of substituting values within library code. The application does not contain any plain SQL queries. Everything done through models and properly escaped before substituting into raw SQL.

Thx for reply.

11.09.13, 22:37, Hanchett, Paul пишет:
Your attached file seems to have been lost to the list...

A classic SQL vulnerabilitiy that can be detected automatically is not using prepared SQL statements rather than an exec query. Here's an article that shows examples of both: http://stackoverflow.com/questions/1703203/in-sqlite-do-prepared-statements-really-improve-performance.

The reason to use prepared statements is *not* speed but rather security: Using prepared statements there is no way I can change the prepared SQL statement into anotherthat command; it's relatively easy to do with an exec, if I can control some portion of the data inserted into the exec (usually through concatenation).

Just a thought.

Paul


Paul Hanchett
-------------------
Infotainment Engineer
MSX on behalf of Jaguar Land Rover
One World Trade Center, 121 Southwest Salmon Street, 11th Floor, Portland, Oregon, 97204

Email: phanc...@jaguarlandrover.com <mailto:phanc...@jaguarlandrover.com>
-------------------

Business Details:
Jaguar Land Rover Limited
Registered Office: Abbey Road, Whitley, Coventry CV3 4LF
Registered in England No: 1672070


On Tue, Sep 10, 2013 at 9:33 PM, Вячеслав Зайцев <sl...@ifaced.ru <mailto:sl...@ifaced.ru>> wrote:

    Hi. Problem with certification. Application rejected with defect
    "Security vulnerabilities in WebApp is detected. For more
    information about the issue, please refer to the attached file.".
    Attached file is a list of methods from JayData library with name
    "executeQuery" and the line number in the file. Example:

    cmd.executeQuery [SqLiteProvider.js]
    sqlCommand.executeQuery [SqLiteProvider.js]
    operationProvider.storageProvider.executeQuery
    [IndexedDbProvider.min.js, IndexedDbProvider.js]
    f.storageProvider.executeQuery [jaydata.min.js]
    command.executeQuery [SqLiteProvider.js]
    e.entityContext.executeQuery [jaydata.min.js]
    data.QueryCache.executeQuery [jaydata.min.js]
    g.executeQuery [SqLiteProvider.min.js]
    a.executeQuery [jaydata.min.js]
    this.entityContext.executeQuery [jaydata.min.js]

    There is no explanation of category of vulnerabilities and how to
    reproduce it. I think that this is result of automatic code
    scanner work and just a mistake, but in comments to issue no one
    answered.

    Who ever encountered a problem like this? How to solve?

    Content ID 000000004857
    Defect ID 2218460
    _______________________________________________
    Application-dev mailing list
    Application-dev@lists.tizen.org
    <mailto:Application-dev@lists.tizen.org>
    https://lists.tizen.org/listinfo/application-dev



--
----------------------------------
Вячеслав Зайцев  www.interfaced.ru
+7-3822-93-81-74   sl...@ifaced.ru
http://linkedin.com/in/vyatcheslav
----------------------------------
_______________________________________________
Application-dev mailing list
Application-dev@lists.tizen.org
https://lists.tizen.org/listinfo/application-dev

Reply via email to