Re: Protection from SQL injection - Mailing list pgsql-sql

From Thomas Mueller
Subject Re: Protection from SQL injection
Date
Msg-id 5f211bd50804270008l326acd69ia4b845e651992cfc@mail.gmail.com
Whole thread Raw
In response to Re: Protection from SQL injection  ("Jaime Casanova" <systemguards@gmail.com>)
List pgsql-sql
Hi,

>  but can't the developer allow literals again?

Executing the statement SET ALLOW_LITERALS should be restricted. The
application uses another user name / password and doesn't have to
access rights to enable it. Maybe the user name / password is
configured using JNDI, so the application developper has no influence
on that. In any case, even if the developer can enable literals, I
don't think he would, because he would be afraid to be caught
cheating.

Regards,
Thomas


pgsql-sql by date:

Previous
From: "Scott Marlowe"
Date:
Subject: Re: Protection from SQL injection
Next
From: "Thomas Mueller"
Date:
Subject: Re: Protection from SQL injection