[ 
https://issues.apache.org/jira/browse/DRILL-5079?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15976832#comment-15976832
 ] 

Casey Morton commented on DRILL-5079:
-------------------------------------

+1 This is a HUGE security risk

> PreparedStatement dynamic parameters to avoid SQL Injection test
> ----------------------------------------------------------------
>
>                 Key: DRILL-5079
>                 URL: https://issues.apache.org/jira/browse/DRILL-5079
>             Project: Apache Drill
>          Issue Type: Improvement
>          Components: Client - JDBC
>    Affects Versions: 1.8.0
>            Reporter: Wahyu Sudrajat
>            Priority: Critical
>              Labels: security
>
> Capability to use PreparedStatement with dynamic parameters to prevent SQL 
> Injection.
> For example:
> select  * from PEOPLE where FIRST_NAME = ? and LAST_NAME = ? limit 100
> As for now, Drill will return:
> Error Message:PreparedStatementCallback; uncategorized SQLException for SQL 
> []; SQL state [null]; error code [0]; Failed to create prepared statement: 
> PLAN ERROR: Cannot convert RexNode to equivalent Drill expression. RexNode 
> Class: org.apache.calcite.rex.RexDynamicParam, RexNode Digest: ?0



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to