• kubica@fedia.io
      link
      fedilink
      arrow-up
      1
      ·
      10 days ago

      And the db name is short for “analysis”, of course

      This person was probably a scientist (of any kind).

    • passepartout@feddit.org
      link
      fedilink
      arrow-up
      4
      ·
      10 days ago

      My friend who helped me research the OAuth vulnerabilities was let go for “security concerns from corporate”

      Good old shooting the messenger.

      • ZoteTheMighty@lemmy.zip
        link
        fedilink
        arrow-up
        0
        ·
        10 days ago

        I mean, they were an employee who was exploring security vulnerabilities with a non-employee who has a blog. I would have fired them too.

        • passepartout@feddit.org
          link
          fedilink
          arrow-up
          1
          ·
          10 days ago

          It is indeed a very risky move without a lot to gain for him personally. But I could guess McDonald’s would have forced him to ignore it and shut up about it if he disclosed this to the higher ups himself, in which case I would have gladly left myself instead.

  • Buckshot@programming.dev
    link
    fedilink
    arrow-up
    1
    ·
    9 days ago

    I got dumped with fixing some bugs in a project written by a contractor who had literally done this but with extra steps.

    Backend was sql server and c#/asp.

    There was an api endpoint that took json, used xslt to transform to xml. Then called the stored procedure specified in request passing the xml as a parameter.

    The stored procedure then queried the xml for parameters, executed the query, and returned results as xml.

    Another xslt transformed that to json and returned to the client.

    It was impressive how little c# there was.

    Despite holding all the business logic, the sql was not in source control.

      • Buckshot@programming.dev
        link
        fedilink
        arrow-up
        2
        ·
        8 days ago

        Yeah, maybe the contractor thought he’d get more work fixing it but he was long gone by the time I got it so i never met him

        One of bugs I got was performance because the search didn’t work, with about 600,000 assets in database it would timeout searching for one by exact match on ID. It took 45 minutes to return 1 result.

  • kibiz0r@midwest.social
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 days ago

    Does ReST mean anything anymore? It was originally a set of principles guiding the development of the HTTP 1.1 spec. Then it meant mapping CRUD to HTTP verbs so application-agnostic load balancers could work right. And now I guess it’s just HTTP+JSON?

  • Blackmist@feddit.uk
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 days ago

    I did this just to reduce network latency. It’s not for public use, and tbh, I don’t think you can even get at it from outside the VPN.

      • Blackmist@feddit.uk
        link
        fedilink
        English
        arrow-up
        0
        ·
        7 days ago

        I haven’t been down to test their public wifi in the cafe to see if that can access it.

        The guy who installed it used to work for us and is a known clown, so it’s entirely possible.

        Although if it is, there’s way worse things they can do from there. Like connect to the actual database for a start.

        • luciferofastora@feddit.org
          link
          fedilink
          arrow-up
          1
          ·
          7 days ago

          Does the database use the same authentication and permissions as the API? If the API authenticates against the DB with a technical user, it may be still be an exploitable vulnerability for people who can’t access the DB directly but can access the API. I don’t know what database it is, what other databases run on the same server and what privileges might be achievable or escalatable, but generally “there are worse weaknesses” isn’t a solid security policy.

          You could give me a VPN access and I’ll take a look around :p

          (Please don’t, actually – in case it needs to be said, running pentests on prod is a dangerously bad idea already even before we get to the whole “trusting a stranger on the Internet just because they sound sorta knowledgeable” issue)

  • julianwgs@discuss.tchncs.de
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    9 days ago

    Why not?

    We did that for a Plotly dashboard in Python. We copied the database into a read-only in-memory sqlite database (it is quite small, only a couple thousand entries) to prevent any damages outside the dashboard. The data only gets updated every couple of days. You could skip this step. Then with sqlite you can restrict what action a query can use (SELECT, JSON, etc.) and you can restrict the instructions per query to prevent denial of service. It works like a charm and is much simpler than providing a REST API. Also the user might already know SQL.

    I am actually planning something similar for a task management web app I am building at the moment (additionally to providing a REST API). No need to learn another query language like in Jira.