Skip to content

Request for Information on Data Theorem Finding #12187

Open
@scottluxenberg

Description

@scottluxenberg

Description

This is bubbling back up #5447

We have a finding in Firebase for App Embeds SQL Query with Dynamic Input References:

The issue linked above has a statement from Firebase saying
the %@ is only for hard coded strings (table names, column names) so that we can reuse the code internally. All user inputs are validated, sanitized and bound appropriately for each query. We have been through security audit of the source code before releasing.

We brought this issue up to our security team, but they have said the comment is not enough attestation. Is there any releasable details of said security audit that shows this attack vector is indeed secure, that I can bring back to my security team?

Reproducing the issue

No response

Firebase SDK Version

10.11

Xcode Version

4.2

Installation Method

CocoaPods

Firebase Product(s)

Crashlytics

Targeted Platforms

iOS

Relevant Log Output

No response

If using Swift Package Manager, the project's Package.resolved

Expand Package.resolved snippet
Replace this line with the contents of your Package.resolved.

If using CocoaPods, the project's Podfile.lock

Expand Podfile.lock snippet
Replace this line with the contents of your Podfile.lock!

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions