You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@drill.apache.org by "Sudheesh Katkam (JIRA)" <ji...@apache.org> on 2016/11/28 18:46:58 UTC
[jira] [Updated] (DRILL-5079) PreparedStatement dynamic parameters
to avoid SQL Injection test
[ https://issues.apache.org/jira/browse/DRILL-5079?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Sudheesh Katkam updated DRILL-5079:
-----------------------------------
Labels: security (was: )
> PreparedStatement dynamic parameters to avoid SQL Injection test
> ----------------------------------------------------------------
>
> Key: DRILL-5079
> URL: https://issues.apache.org/jira/browse/DRILL-5079
> Project: Apache Drill
> Issue Type: Improvement
> Components: Client - JDBC
> Affects Versions: 1.8.0
> Reporter: Wahyu Sudrajat
> Priority: Critical
> Labels: security
>
> Capability to use PreparedStatement with dynamic parameters to prevent SQL Injection.
> For example:
> select * from PEOPLE where FIRST_NAME = ? and LAST_NAME = ? limit 100
> As for now, Drill will return:
> Error Message:PreparedStatementCallback; uncategorized SQLException for SQL []; SQL state [null]; error code [0]; Failed to create prepared statement: PLAN ERROR: Cannot convert RexNode to equivalent Drill expression. RexNode Class: org.apache.calcite.rex.RexDynamicParam, RexNode Digest: ?0
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)