Skip to content

Conversation

@gugu
Copy link
Contributor

@gugu gugu commented Aug 5, 2025

Potential fix for https://github.com/rocket-admin/rocketadmin/security/code-scanning/30

To fix the problem, we should avoid directly interpolating untrusted data into the format string of logging functions. Instead, use a static format string and pass the untrusted data as a separate argument. Specifically, in console.error, replace `Error deleting row in table ${tableName}:` with "Error deleting row in table: %s" and pass tableName as an argument. This ensures that any format specifiers in tableName are not interpreted by the logging function, and the output remains as intended.

Edit the file shared-code/src/data-access-layer/data-access-objects/data-access-object-oracle.ts at line 151, replacing the vulnerable log statement with a safe one.

No new imports or definitions are required.


Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…olled format string

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants