Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Conversation

@skoussa2
Copy link
Owner

test sqli

@reshift-security
Copy link

reshift has scanned for issues for the Pull-Request: 2 issue(s) found

String user=request.getParameter("username").trim();
String pass=request.getParameter("password").trim();

rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Potential SQL Injection (JDBC) - CRITICAL

The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection.

String user=request.getParameter("username").trim();
String pass=request.getParameter("password").trim();

rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Potential SQL Injection (Non-constant String) - CRITICAL

The method invokes the execute or addBatch method on an SQL statement with a String that seems to be dynamically generated

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants

Morty Proxy This is a proxified and sanitized view of the page, visit original site.