Skip to content

Conversation

@skoussa2
Copy link
Owner

test sqli

@reshift-security
Copy link

reshift has scanned for issues for the Pull-Request: 2 issue(s) found

String user=request.getParameter("username").trim();
String pass=request.getParameter("password").trim();

rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Potential SQL Injection (JDBC) - CRITICAL

The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection.

String user=request.getParameter("username").trim();
String pass=request.getParameter("password").trim();

rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Potential SQL Injection (Non-constant String) - CRITICAL

The method invokes the execute or addBatch method on an SQL statement with a String that seems to be dynamically generated

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants