Habi Sajitha Ravi created ZEPPELIN-3725:
-------------------------------------------
Summary: Possible SQL injection
Key: ZEPPELIN-3725
URL: https://issues.apache.org/jira/browse/ZEPPELIN-3725
Project: Zeppelin
Issue Type: Bug
Components: security
Affects Versions: 0.8.0
Reporter: Habi Sajitha Ravi
I was playing with Zeppelin. I found
[JdbcRealm|[https://github.com/apache/zeppelin/blob/3ab6ffaa8bdccb930bd79511f1781d532ef4eac3/zeppelin-server/src/main/java/org/apache/zeppelin/utils/SecurityUtils.java#L452]
] implementation could result in SQL injection. I am not sure about the
exploitability. Since an untrusted user need to modify the config.
vulnerable code
{quote}userquery = String.format("SELECT %s FROM %s", username, tablename);
{quote}
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)