You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@drill.apache.org by "Sudheesh Katkam (JIRA)" <ji...@apache.org> on 2016/11/28 18:46:58 UTC

[jira] [Updated] (DRILL-5079) PreparedStatement dynamic parameters to avoid SQL Injection test

     [ https://issues.apache.org/jira/browse/DRILL-5079?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Sudheesh Katkam updated DRILL-5079:
-----------------------------------
    Labels: security  (was: )

> PreparedStatement dynamic parameters to avoid SQL Injection test
> ----------------------------------------------------------------
>
>                 Key: DRILL-5079
>                 URL: https://issues.apache.org/jira/browse/DRILL-5079
>             Project: Apache Drill
>          Issue Type: Improvement
>          Components: Client - JDBC
>    Affects Versions: 1.8.0
>            Reporter: Wahyu Sudrajat
>            Priority: Critical
>              Labels: security
>
> Capability to use PreparedStatement with dynamic parameters to prevent SQL Injection.
> For example:
> select  * from PEOPLE where FIRST_NAME = ? and LAST_NAME = ? limit 100
> As for now, Drill will return:
> Error Message:PreparedStatementCallback; uncategorized SQLException for SQL []; SQL state [null]; error code [0]; Failed to create prepared statement: PLAN ERROR: Cannot convert RexNode to equivalent Drill expression. RexNode Class: org.apache.calcite.rex.RexDynamicParam, RexNode Digest: ?0



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)