Searching through documentation and forum, I couldn’t find any mention of the so-called hack ‘SQL-Injection’, and the ways to prevent it.
‘SQL-Injection’ consists to put non authorized sql statements (queries) into variables (columns) which are known to be used to construct solution queries.
A conventionnal workaround is to use paramterized queries or to encode all variable parts of the queries by using functions like escape() or unescape().
a) Do you, servoy team, take care of this hacking method?
b) If yes, can you explain the method used?
c) What do you propose to secure developer queries as used in getDatasetByQuery()? Can we use escape() or encodeURI()?
As you probably already suppose it, the protection against ‘SQL-Injection’ is a security requisite for some of our customers. Thank you in advance for your answer.
Btw, may be we could have some use for a forum topic about security threat.