Following is the issue when the security audit was run over the source code in Smart GWT3.0 version.
This database query contains a SQL injection flaw. The function call constructs a dynamic SQL query using a variable
derived from user-supplied input. An attacker could exploit this flaw to execute arbitrary SQL queries against the
database.
isomorphic.jar com/.../tools/DataExport.java 312
Can we have a resolution for this as the production deployment is kind of blocked because of this?
This database query contains a SQL injection flaw. The function call constructs a dynamic SQL query using a variable
derived from user-supplied input. An attacker could exploit this flaw to execute arbitrary SQL queries against the
database.
isomorphic.jar com/.../tools/DataExport.java 312
Can we have a resolution for this as the production deployment is kind of blocked because of this?
Comment