On 10/5/06, Ottinger, Joseph <[EMAIL PROTECTED]> wrote:
I was playing around with JCR's query facility and realised something a little 
scary. Perhaps I'm just ignorant, but... hey, that's why I email the list, 
right?

When I build SQL queries, I do something like this: "select * from nt:unstructured where 
foo='"+bar+"'";

Oh, wait. If I was actually using JDBC, I'd *never* do this, because some fool out there 
will try to set bar to something that will return more than I want it to return. To wit: 
bar might equal "a' or 1=1" and lo, every node will be returned. Application 
error at best, exposure of sensitive data at worst.

Then I thought, well, hey, I have XPath, right? But in XPath, I can construct a 
query the same way. Hello, security hole.

Am I missing something?

well, unlike databases JCR *does* provide fine-grained access control, i.e. the
user will only get those results which he has read-access on.

cheers
stefan


Reply via email to