Skip to content

Sanitize user input to prevent SQL injections #1889

@alexey2baranov

Description

@alexey2baranov

Description

It would be great if we have a sanitize() function fo user input tool to prevent SQL injection. Consider this code

{
  "anonymousId": some_user_input,
  "email": "[email protected]"
}

if user sends SQL injection some_user_input= "0" or something=1 or anonymousId="0", then the result will be

{
  "anonymousId": "0\" or something=1 or anonymousId=\"0",
  "email": "[email protected]"
}

and the error output will contain secure information about all available fields.

Expected Behavior

empty result as there is no such anonymous id "0" or something=1 or anonymousId="0"

Current Behavior

and the output will contain secure information about all available fields.

Context

This is classical SQL injection which possibly appears in every user controller where controller expects user input

Possible Solution

Provide sanitize() function which prevent SQL injections

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions