Direct Event Data Concatenation
Lambda event fields are directly concatenated or formatted into SQL strings without parameterization.
SQL injection vulnerability in AWS Lambda functions where user-controlled event values are concatenated into SQL queries and passed to cursor.execute without parameters in pymssql, potentially allowing attackers to read or modify database data, execute dangerous queries, or compromise application integrity.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Lambda event fields are directly concatenated or formatted into SQL strings without parameterization.
Sourcery automatically identifies sql injection from event data in sql string in aws lambda with pymssql and many other security issues in your codebase.