You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Having such a critical vulnerability unaddressed for more than three years is probably a sign that a strong disclaimer should be added to the landing page, advising against using this package in production.
Queries executed with IO list arguments are not correctly escaped, leading to possible code injections:
emysql:execute(mypool, <<"SELECT * FROM foo WHERE id = ?">>, [["te'st"]]).
I believe the culprit is in emysql_conn.erl:
if
Val
is aniolist
,quote
will have no effect andlist_to_binary
will happily construct an unescaped (binary) string.The text was updated successfully, but these errors were encountered: