Rajeshbabu Chintaguntla created PHOENIX-3613:
------------------------------------------------

             Summary: Avoid possible SQL Injection with proper input validations
                 Key: PHOENIX-3613
                 URL: https://issues.apache.org/jira/browse/PHOENIX-3613
             Project: Phoenix
          Issue Type: Bug
            Reporter: Rajeshbabu Chintaguntla
            Assignee: Rajeshbabu Chintaguntla


There are possible SQL injections :

Issue 1 :
*Overview* : On line 139 of PhoenixUtil.java, the method 
executeStatementThrowException() invokes a SQL query built using input coming 
from an untrusted source. This call could allow an attacker to modify the 
statement's meaning or to execute arbitrary SQL commands.

*Comment* : As the source SQL query can have IN clause in SQL statement, please 
use this link to fix 
http://stackoverflow.com/questions/3107044/preparedstatement-with-list-of-parameters-in-a-in-clause

Issue 2 : 
*Overview* : On line 60 of EntityFactory.java, the method findMultiple() 
invokes a SQL query built using input coming from an untrusted source. This 
call could allow an attacker to modify the statement's meaning or to execute 
arbitrary SQL commands.

*Comment* : Limit value can be misused as well.

*Tagged* : Suspicious

*Overview* : On line 154 of PhoenixUtil.java, the method executeStatement() 
invokes a SQL query built using input coming from an untrusted source. This 
call could allow an attacker to modify the statement's meaning or to execute 
arbitrary SQL commands.

*Comment* : Applying schema to file?



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to