Skip to content

Query Security #80

@treystaff

Description

@treystaff

We should consider some security barrier on the query view. This view takes a raw string as input without any check to ensure someone isn't doing a bunch of DELETE FROM queries. We could filter by IP (#72), but we should probably also consider checking the query string as well. Don't let queries through with key terms like 'delete', 'alter', 'update', 'drop', 'update', etc.

The query function should basically be limited only to fetching information (select queries). Other functionality is already available through views (which limits delete, insert, etc to predictable and controlled queries). Custom sql not let through should probably be limited to admins that have direct access to the psql interface anyway.

@jpaden, what do you thing?

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions