-
Notifications
You must be signed in to change notification settings - Fork 20k
Closed
Labels
π bugSomething isn't workingSomething isn't working
Description
Self Checks
- I have read the Contributing Guide and Language Policy.
- I have searched for existing issues search for existing issues, including closed ones.
- I confirm that I am using English to submit this report, otherwise it will be closed.
- Please do not modify this template :) and fill in all the required fields.
1. Is this request related to a challenge you're experiencing? Tell me about your story.
SQL Injection Vulnerability via LIKE Wildcards
- Use any search/filter functionality that accepts user input for LIKE/ILIKE queries
- Input special characters that are SQL LIKE wildcards:
%,_, or\ - The input is used directly in SQL LIKE queries without proper escaping
- This allows users to inject wildcard patterns that can match unintended data or cause performance issues
2. Additional context or comments
Affected endpoints and methods:
GET /api/console/datasets/{dataset_id}/segments- keyword searchGET /api/console/apps/{app_id}/completion-conversations- keyword searchGET /api/console/apps/{app_id}/chat-conversations- keyword searchAppService.get_apps()- name searchDatasetService.get_datasets()- search parameterDatasetService.get_segments()- keyword searchDatasetService.get_child_chunks()- keyword searchAnnotationService.get_annotation_list_by_app_id()- keyword searchTagService.get_tags()- keyword searchWorkflowAppService.get_paginate_workflow_app_logs()- keyword searchExternalKnowledgeService.get_external_knowledge_apis()- search parameterConversationService.get_conversational_variable()- variable_name searchDatasetRetrievalmetadata filtering - value escaping- Vector DB search methods in
clickzetta_vector.pyandiris_vector.py
3. Can you help us with this feature?
- I am interested in contributing to this feature.
dosubot
Metadata
Metadata
Assignees
Labels
π bugSomething isn't workingSomething isn't working