Closed
Description
Description
This is a generic issue. There are some places in utPLSQL that are vulnerable to SQL injections. We have
- find a way to identify them
- fix them
- set up an automated review mechanism to find such issues, e.g. during our automated builds
@krisrice pointed out the following example in ut_suite_manager.get_cached_suite_data
and c.object_owner = ']'||upper(a_object_owner)||q'['
This line as two issues
- the parameter is not asserted, in this case via
sys.dbms_assert.schema_name
- the parameter is converted to upper case, which leads to wrong results when quoted usernames are used (see also Quoted usernames are not supported #920).
utPLSQL Version
v3.1.7.2808-develop