-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
user_profile.py put operations uses unvalidated external text in query #2059
Comments
I am going to address this as part of #1989 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
this code
takes an unverified string input and inserts it directly into a query. Need to verify but I expect this makes it easy to bypass our code's security: For instance the key
auth0_id = 'whatever', user_id
. Or even the key"\"auth0_id\""
or evenauth0_id = 'whatever'; DELETE WHERE user_id
with value*
We should validate the payload against a JSON schema and explicitly map the fields we want to set from the input.
We should also review our code to ensure we don't do the same thing in other cases.
The text was updated successfully, but these errors were encountered: