Potential fix for code scanning alert no. 30: Use of externally-controlled format string #1295
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Potential fix for https://github.com/rocket-admin/rocketadmin/security/code-scanning/30
To fix the problem, we should avoid directly interpolating untrusted data into the format string of logging functions. Instead, use a static format string and pass the untrusted data as a separate argument. Specifically, in
console.error, replace`Error deleting row in table ${tableName}:`with"Error deleting row in table: %s"and passtableNameas an argument. This ensures that any format specifiers intableNameare not interpreted by the logging function, and the output remains as intended.Edit the file
shared-code/src/data-access-layer/data-access-objects/data-access-object-oracle.tsat line 151, replacing the vulnerable log statement with a safe one.No new imports or definitions are required.
Suggested fixes powered by Copilot Autofix. Review carefully before merging.