Is there a safe injection method for calling through the axpata business connector p>
string salesId = someObject.Text;
IAxaptaRecord salesLine = ax.CreateRecord("SalesLine");
salesLine.ExecuteStmt("select * from %1 where %1.SalesId == '" + salesId + "'");
If someObject.Text is set to the following, then I am vulnerable to input x ++ code:
"SomeSalesOrder' || %1.SalesId == 'SomeOtherOrder"
Is there a way to parameterize the query, or would it be better to write all the data access code directly in x ++ and then call it from COM?
source
share