If I understand the ContentProvider API correctly, much of the API
comes from passing SQL snippets for projects, selection, sort, etc.
This strikes me as particularly dangerous, as these snippets can
easily come from malicious, third party apps.  http://xkcd.com/327/
comes to mind, but this seems worse, as we're dealing with actual SQL,
rather than just string parameters that can be encoded.

I'm sure Google has thought about these problems, and I'm wondering if
anything exists in the APIs or automatically behind the scenes to
sanitize the strings coming into a ContentProvider.

I see some discussion about this issue here:
  http://code.google.com/p/android/issues/detail?id=159
But no follow-up.  (It seems strange to me that this security related
bug, arising from a fundamental design flaw of a core API is
acknowledged as a defect but only marked as "Medium" priority.)



Anm
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
[EMAIL PROTECTED]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to