how does aem prevents sql injection? | Community
Skip to main content
This post is no longer active and is closed to new replies. Need help? Start a new post to ask your question.
Best answer by BrianKasingli

You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.

5 replies

BrianKasingli
BrianKasingliAccepted solution
New Participant
April 28, 2022

You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.

maryani
New Participant
March 27, 2023

Hi 

How can we prevent blind XPath injection for an AEM page??

 

Thanks

 

New Participant
April 5, 2024

I have got a similar vulnerbility in our latest report. Did you find any solution for this?

sourcedcode
New Participant
April 28, 2022

.

arunpatidar
New Participant
April 27, 2022

Please note that JCR SQL injections != RDBMS SQL injections. SQL in JCR is strictly read-only. As far as it is possible to manipulate a query the only risk is information leakage. No data can be manipulated as is the case with RDBMSes.

 

Arun Patidar
Anish-Sinha
Employee
April 27, 2022
Bhuwan_B
New Participant
April 27, 2022