drill-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Casey Morton (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (DRILL-5079) PreparedStatement dynamic parameters to avoid SQL Injection test
Date Thu, 20 Apr 2017 14:55:04 GMT

    [ https://issues.apache.org/jira/browse/DRILL-5079?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15976832#comment-15976832
] 

Casey Morton commented on DRILL-5079:
-------------------------------------

+1 This is a HUGE security risk

> PreparedStatement dynamic parameters to avoid SQL Injection test
> ----------------------------------------------------------------
>
>                 Key: DRILL-5079
>                 URL: https://issues.apache.org/jira/browse/DRILL-5079
>             Project: Apache Drill
>          Issue Type: Improvement
>          Components: Client - JDBC
>    Affects Versions: 1.8.0
>            Reporter: Wahyu Sudrajat
>            Priority: Critical
>              Labels: security
>
> Capability to use PreparedStatement with dynamic parameters to prevent SQL Injection.
> For example:
> select  * from PEOPLE where FIRST_NAME = ? and LAST_NAME = ? limit 100
> As for now, Drill will return:
> Error Message:PreparedStatementCallback; uncategorized SQLException for SQL []; SQL state
[null]; error code [0]; Failed to create prepared statement: PLAN ERROR: Cannot convert RexNode
to equivalent Drill expression. RexNode Class: org.apache.calcite.rex.RexDynamicParam, RexNode
Digest: ?0



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Mime
View raw message