[
http://jira.jboss.com/jira/browse/JBSEAM-2099?page=comments#action_12382308 ]
Diego Ballve commented on JBSEAM-2099:
--------------------------------------
I did not realize it could be omitted. The check for parts[1] becomes:
valid &= ("".equals(parts[1]) || "ASC".equalsIgnoreCase(parts[1])
|| "DESC".equalsIgnoreCase(parts[1]));
Support protection against SQL injection in Query order parameter
-----------------------------------------------------------------
Key: JBSEAM-2099
URL:
http://jira.jboss.com/jira/browse/JBSEAM-2099
Project: JBoss Seam
Issue Type: Patch
Components: Framework
Affects Versions: 2.0.0.CR2
Reporter: Diego Ballve
Attachments: Query.diff
From
http://www.jboss.com/index.html?module=bb&op=viewtopic&t=119810
The 'order' parameter gets directly concatenaded to the query.. that would allow
anything to get injected in the query, possibly resulting in a security threat. This patch
gives the developer extending framework Query the chance to limit the acceptable order
properties.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://jira.jboss.com/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
http://www.atlassian.com/software/jira