A security scan made by AppScan source flags that the input has to be validated (Validation.Required) on the line uprs.updateString
in the code below:
PreparedStatement statement =
conn.prepareStatement (query, ResultSet.TYPE_SCROLL_SENSITIVE, ResultSet.CONCUR_UPDATABLE);
...
ResultSet uprs = statement.executeQuery ();
...
// Update DB ColumnA with input coming from client
uprs.updateString ('ColumnA', unvalidatedUserInput);
...
// Updates the underlying database
uprs.updateRow();
I assume that the intention behind this is to avoid SQL injection attacks, but I'm not sure whether that is possible in that scenario.
Questions: Are SQL Injection attacks possible through these JDBC methods? How does JDBC implements this under the scenes? Would this be another false positive reported by AppScan?
I'm not sure about bluemix-app-scan, but I'm providing my explanation here. (This is my assumption based on the below tests and code pasted)
I ran a test code to check this (in H2 DB)
value of testName String :
(select 'sqlInjection' from dual)
Using
createStatement
(Not-Safe):Output: TEST_CHAR in DB was sqlInjection.
Using
ResultSet
ofcreateStatement
(Safe in H2 DB):Output: Surprisingly TEST_CHAR in DB was (select 'sqlInjection' from dual).
Using
PreparedStatement
(Safe):Output: Expected - TEST_CHAR in DB was (select 'sqlInjection' from dual).
Using
ResultSet
ofprepareStatement
(Safe in H2 DB):Output: Expected - TEST_CHAR in DB was (select 'sqlInjection' from dual).
Back to Questions:
Maybe. It depends on the database driver that you're using.
How? : The reason SQL Injection failed in my result set update was because H2 database internally uses
PreparedStatement
to update the row whenResultSet.updateRow()
is invoked.I'm not sure if all DB drivers in java implemented
updateRow()
method usingpreparedStatement
or not. However it's clear that this is left to the driver and if bluemix is suggesting you to add a validation here, I suggest you follow that :)Well, as shown above this is driver specific. However there is a good explanation on how
PreparedStatement
handles it over here.I don't think this is false positive (but in cases like H2 DB it is) but you'll never know if all database drivers implemented this securely.
Edit -
Even PostgreSQL and MySQL use PreparedStatement to handle this.