--- Torsten Curdt <[EMAIL PROTECTED]> wrote:
> On Wed, 2002-11-06 at 01:00, Carl Mäsak wrote:
> > These are a few things in the "SQL Injection"
> thread that ring true to me
> > (I here take the liberty of rephrasing people's
> opinions in my own words,
> > but try to give due credit to the first one to
> bring up each topic):
> >
> > 1. Functionality for making a pretty secure SQL
> interface in Cocoon
> > already exists today. Using PreparedStatements is
> a good example of this.
> > (Christian Haul)
>
> true - for SQL
Use of request parameters in sitemap and elsewhere
still has holes - for instance, the sitemap ** matcher
allows complete directory traversal IIRC. A pipeline
with a reader ending in ** would allow one to read
../../../../../../../../../../etc/passwd for example.
...
> > 3. SQL Inj:s really is an issue. It's easy to
> write (say) a login script
> > that doesn't check against SQL Injections. (Geoff
> Howard)
The point was that it's a cocoon provided login script
that already has a vulnerability.
>
> we should fix this by using a prepared statement in
> the login action.
right.
>
> > 4. Some users don't want additional protection.
> They are happy with the
> > current level of (lack of) protection, and add
> their own as needed. (Peter
> > Hunsberger)
>
> AFAIU some would also like to have a centralized
> management...
I think the suggestion of overloading
request.getParameter with convenience methods
performing basic type-level validity is really a
strong one. Even better, exposing them in
xsp-request. What would the objections be?
other ideas are:
request.getParameterAsInt
or even
request.getParameter("foo","^[a-zA-Z0-9]$")
I realize this is strictly off the topic of SQL
injection.
Geoff
__________________________________________________
Do you Yahoo!?
HotJobs - Search new jobs daily now
http://hotjobs.yahoo.com/
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, email: [EMAIL PROTECTED]