#389 HIGH: NOTIFY SQL injection via unsanitized channel/payload

closed high Created 2025-12-11 22:21 · Updated 2025-12-12 14:48

Description

Edit
durable_context.py:1683-1698 - NOTIFY uses f-string: cur.execute(f"NOTIFY \"{channel}\", '{payload}'"). Channel not sanitized, payload quote escaping can be bypassed. Fix: Use pg_notify(): cur.execute("SELECT pg_notify(%s, %s)", (channel, payload))

Comments

Loading comments...

Context

Loading context...

Audit History

View All
Loading audit history...