fossasia / open-event-server

Audit required: Risk of possible SQL injection vector through string-based query construction BAN-B608
Security
Major
5 months ago3 years old
Possible SQL injection vector through string-based query construction.
15        dict.append({'name': row['title'], 'link': row['slides_url']})
16        data = f"'{json.dumps(dict)}'"
17        id = row['id']
18        conn.execute(f'UPDATE sessions SET slides = {data} WHERE id = {id}')19
20
21if __name__ == "__main__":
Possible SQL injection vector through string-based query construction.
241    for form, dict_map in CUSTOM_FORM_IDENTIFIER_NAME_MAP.items():
242        for identifier, name in dict_map.items():
243            statements.append(
244                f"UPDATE custom_forms SET name = '{name}' WHERE form = '{form}' and field_identifier = '{identifier}';"245            )
246
247    for statement in statements: