Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Protect against SQL Injection #24

Open
linkleonard opened this issue Feb 19, 2015 · 0 comments
Open

Protect against SQL Injection #24

linkleonard opened this issue Feb 19, 2015 · 0 comments
Assignees

Comments

@linkleonard
Copy link

Reported by llaw02 on 28 Feb 43940689 18:34 UTC
The rule parser library currently use string concatenation to build SQL queries. (See: one of the many examples)

This is prone to SQL injection. The most prominent attack path is the rule "from a specific location", which is directly accessible from the Selexor interface.

We should use prepared statements to protect against this.

@linkleonard linkleonard self-assigned this Feb 19, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant