Skip to content

db operations are susceptible to SQL injection attacks #2

@olitomlinson

Description

@olitomlinson

This is vulnerable to sql-injection as-is, need to try converting to a proc because you can't use parameters in code blocks like below.

            var sql = @$"
            DO $$
            BEGIN 
                IF EXISTS
                    ( SELECT 1
                    FROM   information_schema.tables 
                    WHERE  table_schema = '{_schema}'
                    AND    table_name = '{_table}'
                    )
                THEN
                    DELETE FROM {SchemaAndTable}
                    WHERE 
                        key = '{key}'
                        AND
                        etag = '{etag}';
                END IF;
            END
            $$;";

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions