Quoting Eric Evans <eev...@rackspace.com>:

> On Sat, 2011-07-02 at 19:17 +0100, dnalls...@taz.qinetiq.com wrote:
> > Just to illustrate; the typical injection pattern is:
> > select * from users where KEY='jsmith'; DROP COLUMNFAMILY 'users';
>
> No, each CQL query must contain exactly one statement, so this sort of
> attack would not work.

Excellent, that changes the picture enormously! I guess it might be worth adding
this fact to the preamble of the documentation?

[...]

> TTBMK, there are currently no drivers with bugs that egregious, so make
> use of the driver's parameter substitution, sanitize your input, and you
> shouldn't have anything to worry about (there is almost certainly less
> risk of an injection attack than with SQL).

Thanks very much,

David.



----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.

This email and any attachments to it may be confidential and are
intended solely for the use of the individual to whom it is addressed.
If you are not the intended recipient of this email, you must neither
take any action based upon its contents, nor copy or show it to anyone.
Please contact the sender if you believe you have received this email in
error. QinetiQ may monitor email traffic data and also the content of
email for the purposes of security. QinetiQ Limited (Registered in
England & Wales: Company Number: 3796233) Registered office: Cody Technology 
Park, Ively Road, Farnborough, Hampshire, GU14 0LX http://www.qinetiq.com.

Reply via email to