Use of unsanitized data to issue SQL queries This product is not supported for your selected
Datadog site . (
).
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.
이 규칙을 사용해 보세요 ID: python-flask/sqlalchemy-injection
Language: Python
Severity: Error
Category: Security
CWE : 89
Description Use of unsanitized data from incoming requests in SQL queries may lead to SQL injections. Instead, the data should be filtered and sanitized before use, making sure all potential SQL injections are avoided.
Learn More Non-Compliant Code Examples import flask
import requests
app = flask . Flask ( __name__ )
@app.route ( "/route/to/resource/<resource_id>" )
def resource2 ( resource_id ):
file1 = query . order_by ( resource_id )
file2 = query . having ( f " { resource_id } " )
@app.route ( "/route/to/resource/<resource_id>" )
def resource3 ( resource_id ):
file3 = query . filter ( " {0} " . format ( resource_id ))
@app.route ( "/route/to/resource" )
def resource2 ():
resource_id = flask . request . args . get ( "resource_id" )
file1 = query . group_by ( resource_id )
Compliant Code Examples import flask
import requests
app = flask . Flask ( __name__ )
@app.route ( "/route/to/resource" )
def resource2 ():
resource_id = flask . request . args . get ( "resource_id" )
file1 = query . group_by ( sanitize ( resource_id ))
원활한 통합. Datadog Code Security를 경험해 보세요