Habi Sajitha Ravi created ZEPPELIN-3725:
-------------------------------------------

             Summary: Possible SQL injection
                 Key: ZEPPELIN-3725
                 URL: https://issues.apache.org/jira/browse/ZEPPELIN-3725
             Project: Zeppelin
          Issue Type: Bug
          Components: security
    Affects Versions: 0.8.0
            Reporter: Habi Sajitha Ravi


I was playing with Zeppelin. I found 
[JdbcRealm|[https://github.com/apache/zeppelin/blob/3ab6ffaa8bdccb930bd79511f1781d532ef4eac3/zeppelin-server/src/main/java/org/apache/zeppelin/utils/SecurityUtils.java#L452]
 ] implementation could result in SQL injection.  I am not sure about the 
exploitability. Since  an untrusted user need to modify the config.

 

vulnerable code 
{quote}userquery = String.format("SELECT %s FROM %s", username, tablename);
{quote}
 

 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to