use sqlx::{Connection, Error, SqliteConnection};
#[sqlx::test]
async fn rustsec_2024_0363() -> anyhow::Result<()> {
let overflow_len = 4 * 1024 * 1024 * 1024;
let real_query_prefix = "INSERT INTO injection_target(message) VALUES ('";
let fake_message = "fake_msg') RETURNING id;";
let real_query_suffix = "') RETURNING id";
let real_payload =
"\nUPDATE injection_target SET message = 'you''ve been pwned!' WHERE id = 1;\n--";
let fake_payload_len = real_query_prefix.len() + fake_message.len();
let target_len = overflow_len + fake_payload_len;
let inject_len = target_len - real_query_prefix.len() - real_query_suffix.len();
let pad_len = inject_len - fake_message.len() - real_payload.len();
let mut injected_value = String::with_capacity(inject_len);
injected_value.push_str(fake_message);
injected_value.push_str(real_payload);
let padding = " ".repeat(pad_len);
injected_value.push_str(&padding);
let query = format!("{real_query_prefix}{injected_value}{real_query_suffix}");
assert_eq!(query.len(), target_len);
let mut conn = SqliteConnection::connect("sqlite://:memory:").await?;
sqlx::raw_sql(
"CREATE TABLE injection_target(id INTEGER PRIMARY KEY, message TEXT);\n\
INSERT INTO injection_target(message) VALUES ('existing message');",
)
.execute(&mut conn)
.await?;
let res = sqlx::raw_sql(&query).execute(&mut conn).await;
if let Err(e) = res {
if matches!(e, Error::Protocol(_)) {
return Ok(());
}
panic!("unexpected error: {e:?}");
}
let messages: Vec<String> =
sqlx::query_scalar("SELECT message FROM injection_target ORDER BY id")
.fetch_all(&mut conn)
.await?;
assert_eq!(
messages,
["existing message".to_string(), "fake_msg".to_string()]
);
Ok(())
}