Skip to content
This repository was archived by the owner on Jul 9, 2020. It is now read-only.
This repository was archived by the owner on Jul 9, 2020. It is now read-only.

Check for SQL injection #1

@jhakala

Description

@jhakala

It seems the code allows SQL injection. For example, one can insert additional SQL into the run numbers:
e.g.
http://hcalmon.cms/cgi-bin/RunInfoDiffer/viewDiffer.py?runnumber1=300363&runnumber2=300364
versus
http://hcalmon.cms/cgi-bin/RunInfoDiffer/viewDiffer.py?runnumber1=300363%20AND%20name=%27CMS.HCAL_HBHEc:CFGDOC_TXT%27&runnumber2=300364%20AND%20name=%27CMS.HCAL_HBHEc:CFGDOC_TXT%27

This example is relatively harmless, but in principle SQL injection could cause problems in the web server of the app as well as in the database backend.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions