CQL injection, encode CQL strings, use percent encoding

Description

To avoid CQL injection edge-sip2 needs to properly encode strings:

CSP Request Details

1. Describe issue impact on business Special characters like " \ / ^ * _ are not correctly handled resulting in CQL and SQL injection. This may cause data loss or give illegal database access (read and write). 2. What institutions are affected? (field “Affected Institutions” in Jira to be populated) Attackers don't publish which institutions they will attack. 3. What is the workaround if exists? None. 4. What areas will be impacted by fix (i.e. what areas need to be retested) SIP2 5. Brief explanation of technical implementation and the level of effort (in workdays) and technical risk (low/medium/high) Use proper quoting and encoding. One workday. Low risk because standard quoting and encoding techniques are used. 6. Brief explanation of testing required and level of effort (in workdays). Provide test plan agreed with by QA Manager and PO. Testing edge-sip2. One workday. 7. What is the roll back plan in case the fix does not work? Use previous version.

CSP Rejection Details

None

Potential Workaround

None

Checklist

hide

Activity

Show:

Oleksii Petrenko February 27, 2025 at 4:07 PM

Deployed

Craig McNally February 6, 2025 at 4:16 PM

, we still need to request approval for this to make it into QCSP10, and Ramsons CSP1. Can you please do so? Thanks!

Done

Details

Assignee

Reporter

Priority

Development Team

Volaris

Fix versions

Release

Quesnelia (R1 2024) Service Patch #10

RCA Group

Institution specific (Data)

CSP Approved

Yes

Affected Institution

GBV

TestRail: Cases

Open TestRail: Cases

TestRail: Runs

Open TestRail: Runs
Created January 29, 2025 at 1:40 PM
Updated March 5, 2025 at 4:31 PM
Resolved February 10, 2025 at 9:40 AM
TestRail: Cases
TestRail: Runs