[
https://issues.apache.org/jira/browse/OODT-927?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15302959#comment-15302959
]
ASF GitHub Bot commented on OODT-927:
-------------------------------------
GitHub user lewismc opened a pull request:
https://github.com/apache/oodt/pull/39
OODT-927 Values passed to SQL commands should be sanitized in CAS
DataSourceIngestMapper.java
Hi Folks,
This PR
* uses prepared statements for SQL queries
* sanitizes the variable inputs
* implements try-with-resources if blocks for efficiency which were
introduced in Java 7
* makes commonly used strings static final string constants
* uses @Override explicitly
* adds a wee bit of formatting to core/pom.xml so that Tom's formatting
job is not buggered.
Generally speaking this cuts down on a alot of code, simplifies things and
make it more modern across the concerned package.
You can merge this pull request into a Git repository by running:
$ git pull https://github.com/lewismc/oodt master
Alternatively you can review and apply these changes as the patch at:
https://github.com/apache/oodt/pull/39.patch
To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:
This closes #39
----
commit 1a1cdf1ac8e3dc48187f66923ffd6baa92ced3c3
Author: Lewis John McGibbney <[email protected]>
Date: 2016-05-26T21:25:25Z
OODT-927 Values passed to SQL commands should be sanitized in CAS
DataSourceIngestMapper.java
----
> Values passed to SQL commands should be sanitized in CAS
> DataSourceIngestMapper.java
> ------------------------------------------------------------------------------------
>
> Key: OODT-927
> URL: https://issues.apache.org/jira/browse/OODT-927
> Project: OODT
> Issue Type: Improvement
> Components: catalog
> Affects Versions: 0.12
> Reporter: Lewis John McGibbney
> Assignee: Lewis John McGibbney
> Priority: Critical
> Fix For: 0.13
>
>
> Right now in
> [DataSourceIngestMapper.java|https://github.com/apache/oodt/blob/91d0bafe71124906bd94baad746189caf35fb39c/catalog/src/main/java/org/apache/oodt/cas/catalog/mapping/DataSourceIngestMapper.java]
> values passed to SQL commands are not sanitized. Applications that execute
> SQL commands should neutralize any externally-provided values used in those
> commands. Failure to do so could allow an attacker to include input that
> changes the query so that unintended commands are executed, or sensitive data
> is exposed.
> This issue checks that method parameters are not used directly in
> non-Hibernate SQL statements, and that parameter binding, rather than
> concatenation is used in Hibernate statements.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)