how does aem prevents sql injection?
Solved! Go to Solution.
Views
Replies
Total Likes
You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.
@shikhasoni1 Please refer to below Community URL to get understanding of AEM Security Best Practices:
refer this for the techniques to prevent sql injections - https://labs.tadigital.com/index.php/2018/11/05/sql-injections-overview-and-prevention-techniques/
Please note that JCR SQL injections != RDBMS SQL injections. SQL in JCR is strictly read-only. As far as it is possible to manipulate a query the only risk is information leakage. No data can be manipulated as is the case with RDBMSes.
.
You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.
Hi
How can we prevent blind XPath injection for an AEM page??
Thanks
I have got a similar vulnerbility in our latest report. Did you find any solution for this?
Hi @KiranVe1
Could you please check https://experienceleaguecommunities.adobe.com/t5/adobe-experience-manager/aem-how-can-we-prevent-bli...
Thanks @arunpatidar for the response. Does this mean we can ignore the critical vulnerbility in our latest report?
Hi @KiranVe1
Yes, you can't update/write on AEM if you don't have permission, and by design there is only read permission for queries.
So you can ignore it.