On a website, I want to take a user's query "as is", save it to a
userquery.txt, and then do:

sqlite3 /path/to/mydb < userquery.txt

where /path/to/mydb is a *read-only* file.

Is there *any* risk of an injection attack here?

Specifically, does sqlite3 have any shell escapes or any way to change
the Unix permissions of the file it's accessing?

-- 
We're just a Bunch Of Regular Guys, a collective group that's trying
to understand and assimilate technology. We feel that resistance to
new ideas and technology is unwise and ultimately futile.
_______________________________________________
sqlite-users mailing list
sqlite-users@sqlite.org
http://sqlite.org:8080/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to