Well I wouldnt panic, it quotes literals so a SQL injection attack is pretty unlikely in most if not all cases...I should not have said that this was a major issue with it. im not sure how it handles numeric literals and such but I would imagine its similarly careful about stuff like that as well. To me, having the application layer quote everything is more fragile than bind params but in reality its probably the same security-wise.

On Mar 25, 2006, at 1:42 AM, David Geller wrote:

I hate to get off on this tangent here, but I wasn't aware SQLObject was vulnerable to sql injection - is this really true? (perhaps an example would be useful, or a link......)

Thanks!

David

Michael Bayer wrote:
hi David -
I know that Jonathan continues to have strong opinions on this matter. Personally, I think SQLObject is a perfectly good ORM that should remain in wide use. There is one very major issue with it, which is that AFAIK
it doesnt use bind parameters which leaves it open to SQL injection
attacks. It seems Ian seeks to fix that in SQLObject2. But otherwise, it
...



-------------------------------------------------------
This SF.Net email is sponsored by xPML, a groundbreaking scripting language
that extends applications into web and mobile media. Attend the live webcast
and join the prime developer group breaking into this new coding territory!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=110944&bid=241720&dat=121642
_______________________________________________
Sqlalchemy-users mailing list
Sqlalchemy-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlalchemy-users

Reply via email to