You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@phoenix.apache.org by "ASF GitHub Bot (Jira)" <ji...@apache.org> on 2023/05/03 05:57:00 UTC

[jira] [Commented] (PHOENIX-6560) Rewrite dynamic SQL queries to use Preparedstatement

    [ https://issues.apache.org/jira/browse/PHOENIX-6560?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17718797#comment-17718797 ] 

ASF GitHub Bot commented on PHOENIX-6560:
-----------------------------------------

stoty commented on PR #1586:
URL: https://github.com/apache/phoenix/pull/1586#issuecomment-1532483494

   started a new ci build, as the results have aged out.




> Rewrite dynamic SQL queries to use Preparedstatement
> ----------------------------------------------------
>
>                 Key: PHOENIX-6560
>                 URL: https://issues.apache.org/jira/browse/PHOENIX-6560
>             Project: Phoenix
>          Issue Type: Improvement
>          Components: core
>            Reporter: Istvan Toth
>            Assignee: Abhishek Kothalikar
>            Priority: Major
>
> Most of the Phoenix code base already uses PreparedStatements, and adds all potentially vulnerable data as parameters.
> However, there are some places where we concatenate potentially problematic strings into the query.
> While most of those are constants and such, we should preferably pass all data as parameters to be on the safe side.
> (We still have to use dynamic strings for the preparedstatement strings, for handling things as is null, empty in clauses and such)
> Spotbugs marks these with SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE, so they're easy to find.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)