• @[email protected]
    link
    fedilink
    English
    15
    edit-2
    3 days ago
    GET /api/database?query=SELECT+++name+++FROM+++users+++WHERE+++id=42
    

    I’ve seen that exact type of endpoint, hitting databases in production. 🔥

    • @surewhynotlem
      link
      English
      13 days ago

      If that’s a pass through, that’s bad.

      If that’s used for authentication, authorization, credential limiting, or rate limiting, then sure.

      • @[email protected]
        link
        fedilink
        English
        33 days ago

        There is no context in this world validating this level of unsanitized SQL. Even for internal use this is bad, since it bypasses the auth of server and dbms.