Open
Description
Description
This is bubbling back up #5447
We have a finding in Firebase for App Embeds SQL Query with Dynamic Input References:
The issue linked above has a statement from Firebase saying
the %@ is only for hard coded strings (table names, column names) so that we can reuse the code internally. All user inputs are validated, sanitized and bound appropriately for each query. We have been through security audit of the source code before releasing.
We brought this issue up to our security team, but they have said the comment is not enough attestation. Is there any releasable details of said security audit that shows this attack vector is indeed secure, that I can bring back to my security team?
Reproducing the issue
No response
Firebase SDK Version
10.11
Xcode Version
4.2
Installation Method
CocoaPods
Firebase Product(s)
Crashlytics
Targeted Platforms
iOS
Relevant Log Output
No response
If using Swift Package Manager, the project's Package.resolved
Expand Package.resolved
snippet
Replace this line with the contents of your Package.resolved.
If using CocoaPods, the project's Podfile.lock
Expand Podfile.lock
snippet
Replace this line with the contents of your Podfile.lock!