-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
It looks like the following is vulnerable to SQL injection. It ought to be solved by whitelisting against the model's parameters, and also escaping the inputs.
| query = resource.where(permitted_params).where(fuzzy_search_field, fuzzy_search_query).order(order_params).paginate(pagination_params) |
generalized_api/lib/generalized_api/api.rb
Lines 149 to 151 in 093ea7b
| def fuzzy_search_field | |
| "#{params["search_field"]} #{GeneralizedApi::DATABASE_LIKE} ?" | |
| end |
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels