how does aem prevents sql injection?
Solved! Go to Solution.
Views
Replies
Total Likes
You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.
@shikhasoni1 Please refer to below Community URL to get understanding of AEM Security Best Practices:
refer this for the techniques to prevent sql injections - https://labs.tadigital.com/index.php/2018/11/05/sql-injections-overview-and-prevention-techniques/
Please note that JCR SQL injections != RDBMS SQL injections. SQL in JCR is strictly read-only. As far as it is possible to manipulate a query the only risk is information leakage. No data can be manipulated as is the case with RDBMSes.
.
You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.
Hi
How can we prevent blind XPath injection for an AEM page??
Thanks
I have got a similar vulnerbility in our latest report. Did you find any solution for this?
Hi @KiranVe1
Could you please check https://experienceleaguecommunities.adobe.com/t5/adobe-experience-manager/aem-how-can-we-prevent-bli...
Thanks @arunpatidar for the response. Does this mean we can ignore the critical vulnerbility in our latest report?
Hi @KiranVe1
Yes, you can't update/write on AEM if you don't have permission, and by design there is only read permission for queries.
So you can ignore it.
Views
Likes
Replies
Views
Likes
Replies
Views
Likes
Replies