[ 
https://issues.apache.org/jira/browse/PHOENIX-3613?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15832036#comment-15832036
 ] 

Josh Elser commented on PHOENIX-3613:
-------------------------------------

+1 LGTM. Thanks [~rajeshbabu]!

> Avoid possible SQL Injection with proper input validations
> ----------------------------------------------------------
>
>                 Key: PHOENIX-3613
>                 URL: https://issues.apache.org/jira/browse/PHOENIX-3613
>             Project: Phoenix
>          Issue Type: Bug
>            Reporter: Rajeshbabu Chintaguntla
>            Assignee: Rajeshbabu Chintaguntla
>         Attachments: PHOENIX-3613.patch
>
>
> There are possible SQL injections :
> Issue 1 :
> *Overview* : On line 139 of PhoenixUtil.java, the method 
> executeStatementThrowException() invokes a SQL query built using input coming 
> from an untrusted source. This call could allow an attacker to modify the 
> statement's meaning or to execute arbitrary SQL commands.
> *Comment* : As the source SQL query can have IN clause in SQL statement, 
> please use this link to fix 
> http://stackoverflow.com/questions/3107044/preparedstatement-with-list-of-parameters-in-a-in-clause
> Issue 2 : 
> *Overview* : On line 60 of EntityFactory.java, the method findMultiple() 
> invokes a SQL query built using input coming from an untrusted source. This 
> call could allow an attacker to modify the statement's meaning or to execute 
> arbitrary SQL commands.
> *Comment* : Limit value can be misused as well.
> *Tagged* : Suspicious
> *Overview* : On line 154 of PhoenixUtil.java, the method executeStatement() 
> invokes a SQL query built using input coming from an untrusted source. This 
> call could allow an attacker to modify the statement's meaning or to execute 
> arbitrary SQL commands.
> *Comment* : Applying schema to file?



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to