Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> attach to write a file with a name that is meaningful to something else on your system.

Yes, this is what I meant, e.g. writing to ~/.bash_profile or so. Forbidding queries to do something like this could have a large negative effect on the capability of the database engine to its users.



I mean, just writing to ~/.bash_profile wont work as i assume it needs to be executable. (I assume it wont work if the file already exists since it expects to be a valid db if it exists).

In practise, finding an actual path to write to that actually gets code to execute might be tricky in the context of a unix user used just for one specific sqlite backed service.

Sqlite also has an option to disable the attach keyword (SQLITE_LIMIT_ATTACHED). It is very rare to get sql injection at the beginning of the query so in practise this usually isn't an issue (although i guess that was your point).


> I mean, just writing to ~/.bash_profile wont work as i assume it needs to be executable.

It does not. It's an RC file sourced by the shell, not a script.

> It is very rare to get sql injection at the beginning of the query so in practise this usually isn't an issue (although i guess that was your point).

Yes. Would also be required to use these vulnerabilities.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: