Zxce3 / userbot

Audit required: Risk of possible SQL injection vector through string-based query construction BAN-B608
Security
Major
a year ago2 years old
Possible SQL injection vector through string-based query construction.
136        self._conn.commit()
137
138    def get_collection(self, module: str) -> dict:
139        sql = f"SELECT * FROM '{module}'"140        cur = self._execute(module, sql)
141
142        collection = {}
Possible SQL injection vector through string-based query construction.
131        return True
132
133    def remove(self, module: str, variable: str):
134        sql = f"DELETE FROM '{module}' WHERE var=:var"135        self._execute(module, sql, {"var": variable})
136        self._conn.commit()
137
Possible SQL injection vector through string-based query construction.
 97            self._lock.release()
 98
 99    def get(self, module: str, variable: str, default=None):
100        sql = f"SELECT * FROM '{module}' WHERE var=:var"101        cur = self._execute(module, sql, {"tabl": module, "var": variable})
102
103        row = cur.fetchone()