Opened 17 months ago
Last modified 17 months ago
#10 new task
Find and Replace Possible QL Injection Vulnerabilities — at Version 1
Reported by: | me egan | Owned by: | somebody |
---|---|---|---|
Priority: | major | Milestone: | Maintenance and Security |
Component: | component1 | Version: | |
Keywords: | Cc: |
Description (last modified by )
Find an Replace Possible SQL Injection Vulnerabilities. Use bind parameters with sqlalchemy.sql.expression.text to avoid SQL injection.
Also look at using the sql/core layer to build queries should also work of course, ie. session.execute(select(my_table).where(id=some_id)).
Change History (1)
comment:1 by , 17 months ago
Description: | modified (diff) |
---|---|
Milestone: | → Maintenance and Security |
Type: | defect → task |
Note:
See TracTickets
for help on using tickets.