Suppress warning about CVE-2024-49203 #71

Merged
tozh4728 merged 1 commits from cve-2024-49203 into develop 2025-01-09 12:54:44 +01:00
Owner

https://nvd.nist.gov/vuln/detail/CVE-2024-49203
https://github.com/querydsl/querydsl/issues/3757

Basically if you allow untrusted user input to be used in the "ORDER BY" clause you can be vulnerable to SQL injection.

I believe this is nonsense and akin to saying every Java application has a security vulnerability because JDBC allows you to execute arbitrary SQL if you do not properly use PreparedStatement with parameters over a string-concatenated Statement.

Even if this is considered a valid vulnerability we do not, currently, allow untrusted user input to be used in the "ORDER BY" clause.

Fixes #45

https://nvd.nist.gov/vuln/detail/CVE-2024-49203 https://github.com/querydsl/querydsl/issues/3757 Basically if you allow untrusted user input to be used in the "ORDER BY" clause you can be vulnerable to SQL injection. I believe this is nonsense and akin to saying every Java application has a security vulnerability because JDBC allows you to execute arbitrary SQL if you do not properly use PreparedStatement with parameters over a string-concatenated Statement. Even if this is considered a valid vulnerability we do not, currently, allow untrusted user input to be used in the "ORDER BY" clause. Fixes #45
ansv7779 added 1 commit 2024-12-20 15:01:17 +01:00
Suppress warning about CVE-2024-49203
All checks were successful
Deploy to branch.dsv.su.se / deploy (pull_request) Successful in 2m31s
Build and test / build-and-test (push) Successful in 15m45s
Remove branch deployment from branch.dsv.su.se / cleanup (pull_request) Successful in 17s
5540b4160b
https://nvd.nist.gov/vuln/detail/CVE-2024-49203
https://github.com/querydsl/querydsl/issues/3757

Basically if you allow untrusted user input to be used in the "ORDER BY" clause
you can be vulnerable to SQL injection.

I believe this is nonsense and akin to saying every Java application has a
security vulnerability because JDBC allows you to execute arbitrary SQL if you
do not properly use PreparedStatement with parameters over a string-concatenated
Statement.

Even if this is considered a valid vulnerability we do not, currently, allow
untrusted user input to be used in the "ORDER BY" clause.
ansv7779 added this to the SciPro project 2024-12-20 15:01:17 +01:00
First-time contributor
Deployed to https://scipro-cve-2024-49203.branch.dsv.su.se
tozh4728 approved these changes 2025-01-08 09:50:10 +01:00
tozh4728 merged commit 6bdd5c63ea into develop 2025-01-09 12:54:44 +01:00
tozh4728 deleted branch cve-2024-49203 2025-01-09 12:54:44 +01:00
tozh4728 removed this from the SciPro project 2025-01-09 14:31:05 +01:00
Sign in to join this conversation.
No description provided.