Habi Sajitha Ravi created ZEPPELIN-3725: -------------------------------------------
Summary: Possible SQL injection Key: ZEPPELIN-3725 URL: https://issues.apache.org/jira/browse/ZEPPELIN-3725 Project: Zeppelin Issue Type: Bug Components: security Affects Versions: 0.8.0 Reporter: Habi Sajitha Ravi I was playing with Zeppelin. I found [JdbcRealm|[https://github.com/apache/zeppelin/blob/3ab6ffaa8bdccb930bd79511f1781d532ef4eac3/zeppelin-server/src/main/java/org/apache/zeppelin/utils/SecurityUtils.java#L452] ] implementation could result in SQL injection. I am not sure about the exploitability. Since an untrusted user need to modify the config. vulnerable code {quote}userquery = String.format("SELECT %s FROM %s", username, tablename); {quote} -- This message was sent by Atlassian JIRA (v7.6.3#76005)