Hi Jim,

On Sun, Apr 15, 2007 at 10:19:34AM -0700, Jim Busser wrote:
> The vulnerabilities of SQL injection re getting some extra discussion  
> lately, maybe only a "bump" in a known vulnerability on account of  
> browser-based cross-site scripting attacks.
Yes, an attack known-to and recognized-by the GNUmed
developers.

Some factoids:

- injection attacks only happen if the values are sent
  in-the-query as opposed to alongside with the query for
  the server to handle
        - which psycopg2 (our database library) does but will change
          in the future at which point GNUmed will gain that extra
          security transparently

- injection attacks only happen on wrongly/unescaped values
  put into queries
        - which GNUmed does not do but rather hands *all* values
          to psycopg2 which does proper escaping (and thereby
          sanitizing)

So, barring bugs in psycopg2's quoting/escaping algorithm, we
aren't vulnerable. And we will transparently become entirely
invulnerable once psycopg2 starts sending values
out-of-query instead of escaping them into the query.

IOW, we did take due action the minimize the risk.

Thanks for the inquiry, though.

Karsten
-- 
GPG key ID E4071346 @ wwwkeys.pgp.net
E167 67FD A291 2BEA 73BD  4537 78B9 A9F9 E407 1346


_______________________________________________
Gnumed-devel mailing list
[EMAIL PROTECTED]
http://lists.gnu.org/mailman/listinfo/gnumed-devel

Reply via email to