/*
* Copyright (C) 2017 Dominik Schadow, dominikschadow@gmail.com
*
* This file is part of the Java Security project.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package de.dominikschadow.javasecurity.database;
import de.dominikschadow.javasecurity.domain.Customer;
import org.owasp.esapi.ESAPI;
import org.owasp.esapi.codecs.OracleCodec;
import org.springframework.jdbc.core.JdbcTemplate;
import org.springframework.stereotype.Component;
import java.util.List;
import java.util.Map;
/**
* Servlet using a normal Statement to query the in-memory-database.
* User input is escaped with ESAPI and used in the SQL query afterwards.
*
* @author Dominik Schadow
*/
@Component
public class EscapedQuery {
private JdbcTemplate jdbcTemplate;
public EscapedQuery(JdbcTemplate jdbcTemplate) {
this.jdbcTemplate = jdbcTemplate;
}
public List<Customer> query(String name) {
String safeName = ESAPI.encoder().encodeForSQL(new OracleCodec(), name);
String query = "SELECT * FROM customer WHERE name = '" + safeName + "' ORDER BY id";
List<Map<String, Object>> rows = jdbcTemplate.queryForList(query);
return CustomerRowMapper.mapRows(rows);
}
}