mardi 22 décembre 2015

Active Android is it prone to SQL injections. Any known solution?

Android application is already developed using ActiveAndroid

public static List<ModelNames> search(String pattern) {
        return new Select().from(ModelNames.class).where("title LIKE '%" + pattern + "%' or content LIKE '%" + pattern + "%'").orderBy("title").execute();
    }

Now its prone to SQL injections.

Has anyone faced a similar problem and found a solution or could anyone provide a solution for the same?

Found a issue on github, but could not get a proper solution.

Aucun commentaire:

Enregistrer un commentaire