[ https://issues.apache.org/jira/browse/OPENJPA-2717?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Péter Gergő Barna updated OPENJPA-2717: --------------------------------------- Attachment: OPENJPA-2717-trunk-2.patch > ValidationQuery should be excluded from ConnectionProperties > ------------------------------------------------------------- > > Key: OPENJPA-2717 > URL: https://issues.apache.org/jira/browse/OPENJPA-2717 > Project: OpenJPA > Issue Type: Bug > Components: docs, kernel > Reporter: Péter Gergő Barna > Priority: Minor > Attachments: OPENJPA-2717-trunk-2.patch > > > ValidationQuery should be excluded from openjpa.ConnectionProperties and > should be a separate property. > It is plausible that an application would _not_ allow the the ValidationQuery > to be configured, rather it would be hardcoded in the application. > On the other hand, the application may allow other db driver specific > properties to be configured, and these values would then be concatenated into > a ConnectionProperties string and passed by the application to the > openjpa.ConnectionProperties, and then subsequently parsed into propertty map > and passed to the driver by openjpa. > If the application does not sanitize all the configuration values that gets > their way into the openjpa.ConnectionProperties string, then it is possible > a for an attacker to a use driver specific setting to execute arbitrary SQL. > For example, let's suppose an application has this config option for the db > connection: trustServerCertificate=true/false. Lets suppose this config > property is concatenated into the openjpa.ConnectionProperties string by the > application. The following value could result in executing a delete statement > each time a connection validation query runs: > trustServerCertificate=true,TestOnBorrow=true,ValidationQuery=delete from > transactions where id = 'abcd' > We have recently found and fixed such security hole in our application and I > think it would be nice to have this fix in openjpa so it would prevent naive > application developers to add such security holes into his/her application. > I am not familiar with openjpa codebase, but I included a rudimentary fix, so > that it would be clear what I'm thinking about. -- This message was sent by Atlassian JIRA (v6.4.14#64029)