You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@zeppelin.apache.org by "Habi Sajitha Ravi (JIRA)" <ji...@apache.org> on 2018/08/16 11:14:00 UTC

[jira] [Created] (ZEPPELIN-3725) Possible SQL injection

Habi Sajitha Ravi created ZEPPELIN-3725:
-------------------------------------------

             Summary: Possible SQL injection
                 Key: ZEPPELIN-3725
                 URL: https://issues.apache.org/jira/browse/ZEPPELIN-3725
             Project: Zeppelin
          Issue Type: Bug
          Components: security
    Affects Versions: 0.8.0
            Reporter: Habi Sajitha Ravi


I was playing with Zeppelin. I found [JdbcRealm|[https://github.com/apache/zeppelin/blob/3ab6ffaa8bdccb930bd79511f1781d532ef4eac3/zeppelin-server/src/main/java/org/apache/zeppelin/utils/SecurityUtils.java#L452] ] implementation could result in SQL injection.  I am not sure about the exploitability. Since  an untrusted user need to modify the config.

 

vulnerable code 
{quote}userquery = String.format("SELECT %s FROM %s", username, tablename);
{quote}
 

 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)