aboutsummaryrefslogtreecommitdiff
path: root/src/tutorial/funcs.source
diff options
context:
space:
mode:
authorBarry Lind <barry@xythos.com>2003-08-07 04:03:13 +0000
committerBarry Lind <barry@xythos.com>2003-08-07 04:03:13 +0000
commitacf09c64b0264715a4e29d3e04b5ca274350765a (patch)
tree74b4f7931d00aec6bb339611b6644f0bb06c5e80 /src/tutorial/funcs.source
parentf0f137599ae5af43f15363f921744bd3c2361966 (diff)
downloadpostgresql-acf09c64b0264715a4e29d3e04b5ca274350765a.tar.gz
postgresql-acf09c64b0264715a4e29d3e04b5ca274350765a.zip
Sometimes the third time is the charm. Third try to fix the sql injection
vulnerability. This fix completely removes the ability (hack) of being able to bind a list of values in an in clause. It was demonstrated that by allowing that functionality you open up the possibility for certain types of sql injection attacks. The previous fix attempts all focused on preventing the insertion of additional sql statements (the semi-colon problem: xxx; any new sql statement here). But that still left the ability to change the where clause on the current statement or perform a subselect which can circumvent applicaiton security logic and/or allow you to call any stored function. Modified Files: jdbc/org/postgresql/jdbc1/AbstractJdbc1Statement.java
Diffstat (limited to 'src/tutorial/funcs.source')
0 files changed, 0 insertions, 0 deletions