Tables in a courtyard

image by Dimitra Peppa

Really, Really, Really Don’t Interpolate Strings into Active Record Methods

Protecting your application against malicious users is one of your key responsibilites as a developer. The built-in security provided by a well-maintained framework, such as Rails, is an excellent reason to use one.

RailsConf 2024

I'm co-chairing RailsConf 2024 in Detroit May 7–9. Come and join us 

This is particularly true of the protection afforded within Active Record for sanitizing user input before it is written to your database. However there are ways to pass strings directly to Active Record scopes when you need to, but that power should be used very sparingly and carefully.

Instead of…

…using strings in any arguments sent to Active Record:

User.delete_by("id = #{params[:id]}")
User.where("email = #{params[:email]}")

Use…

…hash-based variants of the same methods:

User.delete_by(id: params[:id])
User.where(email: params[:email])

Why?

Rails is a sharp knife. While it does a lot for developers, it also allows you the flexibility to bend the framework to your use case. In this case: passing strings to Active Record methods.

You’re unlikely to reach for string interpolation in the specific examples above given the breadth of support for straightforward database actions in Active Record, but when you have a long and complex SQL query, it is easy to forget to sanitize any user input.

Using strings with interpolated (and user-provided) parameters opens you up to SQL injection attacks.

# user-provided parameter
params[:id] = "1) OR 1=1--"
User.delete_by("id = #{params[:id]}")
#=> User Delete All (4.2ms)  DELETE FROM "users" WHERE (id = 1) OR 1=1--)

The 1=1 part of the user-provided string above is always true and so would trigger an SQL command that drops every user in your database. Not good.

Interpolating values directly into the arguments can lead to unpredictable behaviour and results, not just malicious destructive examples like the one above. For example, you might leak information you hadn’t intended to.

params[:q] = "'' OR 1=1"
User.where("email = #{params[:q]}")
#=> User Load (1.1ms)  SELECT "users".* FROM "users" WHERE (email = '' OR 1=1)

In this case the resulting SQL actually loads all the users from your database, leaking that information, because the unsanitized 1=1 in the WHERE condition in the SQL is always true.

Finally, the string-based arguments make your code harder to read and understand. The syntax for the hash-based approach is much easier to comprehend.

Why not?

You could make use of Active Record’s escaping by using array conditions.

params[:q] = "'' OR 1=1"
User.where("email = ?", params[:q])
#=> User Load (13.4ms)  SELECT "users".* FROM "users" WHERE (email = ''''' OR 1=1')

This syntax lets the database engine do the interpolation, rather than doing the interpolation in the string yourself.

This is a safer approach for queries that cannot be expressed as hashes. For example an SQL LIKE` query. (h/t to ben on this point)

The risks above are contrived examples, yet demonstrate real weaknesses.

If you’re unable to use the hash-style for the specific query you require and you really, really, really, know what you’re doing, then use the array-based arguments. But be careful.

Brighton Ruby 2024

Still running UK’s friendliest, Ruby event on Friday 28th June. Ice cream + Ruby 


Last updated on May 29th, 2023 by @andycroll

An email newsletter, with one Ruby/Rails technique delivered with a ‘why?’ and a ‘how?’ every two weeks. It’s deliberately brief, focussed & opinionated.