-
Notifications
You must be signed in to change notification settings - Fork 70
Open
Description
Description
It would be great if we have a sanitize() function fo user input tool to prevent SQL injection. Consider this code
{
"anonymousId": some_user_input,
"email": "[email protected]"
}if user sends SQL injection some_user_input= "0" or something=1 or anonymousId="0", then the result will be
{
"anonymousId": "0\" or something=1 or anonymousId=\"0",
"email": "[email protected]"
}and the error output will contain secure information about all available fields.
Expected Behavior
empty result as there is no such anonymous id "0" or something=1 or anonymousId="0"
Current Behavior
and the output will contain secure information about all available fields.
Context
This is classical SQL injection which possibly appears in every user controller where controller expects user input
Possible Solution
Provide sanitize() function which prevent SQL injections
Metadata
Metadata
Assignees
Labels
No labels