Thank you for reporting this, we are looking into it.

However, let me de-alarm the alarmist portion of this post with respect to SQL Injection attacks.

It has been a long held view that you should _ALWAYS_ use CFQUERYPARAM (aka prepared statements) for anything that accepts text from the open public. If you still have a code out in the field like this, then this is bad and should be fixed asap. When i code review my team, it is one of the top things that always gets picked off the list.

This is not a new thing and has always been the advice in many forums for a number of years now. Always assume that your data from users are always dirty and potentially dangerous. Do as much as you can to clean and sanitize it.

If anything it is just good practice. It does way more escaping and preparation than the rudimentary escaping of ' -> \'.

Secondly, if you are using MySQL then the underlying driver and database, no longer suffer from this. So statements such as:

SELECT * FROM Table where a="'; drop database'

won't actually work. Java drivers do not suffer from this as much as the PHP ones did where most of the scaremongering stories come from.

Wide sweeping (and factually incorrect) statements such as the one you posted here, does not paint the full story and only goes to incite panic where non need exist.

Thank you for raising the issue with us and we are looking into it.

dRD wrote:
Basically, now, any code that uses built-in OBD functions inside
CFQUERY, are exposed to SQL injection attacks.


--
official tag/function reference: http://openbd.org/manual/
mailing list - http://groups.google.com/group/openbd?hl=en

Reply via email to