Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Utilize Parameterized SQL Queries to Address DAST Issues #18

Open
harsh0620 opened this issue Feb 5, 2024 · 0 comments
Open

Utilize Parameterized SQL Queries to Address DAST Issues #18

harsh0620 opened this issue Feb 5, 2024 · 0 comments

Comments

@harsh0620
Copy link

Dear Maintainers,

I hope this message finds you well. I have identified a security concern related to the usage of raw SQL queries in two functions within the package. These queries are flagged as vulnerabilities during Dynamic Application Security Testing (DAST) scans in Android applications.

Affected Functions:

  1. Function: setVersion(int version)
  public void setVersion(int version) {
    execSQL("PRAGMA user_version = " + version);
}
  1. Function: setPageSize(long numBytes)
 public void setPageSize(long numBytes) {
    execSQL("PRAGMA page_size = " + numBytes);
}

Issue Description:
The mentioned functions use raw SQL queries, which can potentially lead to SQL injection vulnerabilities. To enhance the security of the [Package Name] package, I recommend updating the code to utilize parameterized SQL queries instead.

Suggested Resolution:
Refactor the code to use parameterized SQL queries in the affected functions to prevent SQL injection vulnerabilities. This will ensure the package does not pose a risk during DAST scans for Android applications.

Thank you for your attention to this matter. I appreciate your efforts in maintaining the security of the package.

Best Regards,
Harsh Chandravanshi

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant