You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.
Database queries being formed with concatenation of strings/stringified values
In smart-contract module, Institutions.txt file, query is constructed using string concatenation and uses parameters directly, which may lead to query injection issues.
The attack vector is a peer node in the blockchain community - which can send malicious parameters causing SQL injection.
$2 is used by concatenation
Line 23:"ON CONSTRAINT institutions_pkey DO UPDATE SET name = $2, allowed = true;"
$1 is used by concatenation
Line 26:const changed = await query("UPDATE", "institutions", "SET allowed = false WHERE institution = $1;"
The text was updated successfully, but these errors were encountered:
Database queries being formed with concatenation of strings/stringified values
In smart-contract module, Institutions.txt file, query is constructed using string concatenation and uses parameters directly, which may lead to query injection issues.
The attack vector is a peer node in the blockchain community - which can send malicious parameters causing SQL injection.
Line 23:"ON CONSTRAINT institutions_pkey DO UPDATE SET name = $2, allowed = true;"
Line 26:const changed = await query("UPDATE", "institutions", "SET allowed = false WHERE institution = $1;"
The text was updated successfully, but these errors were encountered: