-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SQL injection is possible with mysql.escape function #342
Comments
Well.. it is. But one of the flags of the connection disallows multiple statements so you don't need to be worried about statement injection :-) |
Of course you can remove that flag but that's not the default behavior. If you remove it, use at your own risk. |
With
It's again SQL injection (even if this code is a bad practice). The solution is simple, escape the ` character in column names. |
I don't understand. What is that supposed to do? |
From documentation :
The problem is not to understand what my code is doing, the problem is that you can inject SQL in column identifiers but the documentation says it's not possible if you use the escape function. Why would you allow the user to specify the column name? Sorting / grouping / filtering data in a CRUD service for example. If this you're still not convinced by this example, well forget it, I will just patch my local copy. |
I'm not completely convinced, but that doesn't mean we can't do something about it. Still, your example is a very bad practice. Even if you allow a user to do some kind of sorting you should match against a list of allowable columns.. but if you're going to patch feel free to post the change or do a pull request :) |
@dresende I think the issue is that we don't escape object keys here: https://github.com/felixge/node-mysql/blob/master/lib/protocol/SqlString.js#L111 I think we should escape them, and that should close this injection problem. |
Yeah, I'll look into what is a possible identifier and try to escape anything else. |
Patch is available here: https://github.com/sebdej/node-mysql/commit/075080bcbf1d9e540e1dc774c79b1fa53230d3cb Sorry I'm a GitHub newbie, I don't known if it is the right way to proceed. |
I'll look into it. For the best github experience, I advise you to do a branch on your fork and then commit changes to it. After that you can go to github and create the pull request to this repository. It's easy and allows you to make different requests without mixing commits. But I'll look into your patch. |
Thank you, but you should forbid qualified identifier as object key : console.log(mysql.escape({ 'a.b.c': 1 })); // `a`.`b`.`c` = 1 It's a potential vulnerability. |
Ok, I'll change it. Basically, you want a 2nd param that can forbid qualified identifiers to avoid fetching from tables/databases you don't want. |
SQL injection is possible despite using mysql.escape:
SqlString.objectToValues is the problem, it doesn't properly escape the object keys.
The text was updated successfully, but these errors were encountered: