Skip to content

Conversation

@skoussa
Copy link
Owner

@skoussa skoussa commented Nov 8, 2019

No description provided.

@reshift-security
Copy link

reshift is scanning for issues for this Pull-Request...

*/
@Override
protected void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Potential SQL Injection (JDBC) - CRITICAL

The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection.

processRequest(request, response);

String user=request.getParameter("username").trim();
String pass=request.getParameter("password").trim();

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Potential SQL Injection (Non-constant String) - CRITICAL

The method invokes the execute or addBatch method on an SQL statement with a String that seems to be dynamically generated

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants