10000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ('SQL Injection') [VID:10] · Issue #30 · github-workflow-org-preprod/verademo · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ('SQL Injection') [VID:10] #30

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
veracode-workflow-app-preprod bot opened this issue Jul 17, 2024 · 0 comments
Labels
Veracode Policy Scan A Veracode Flaw found during a Policy or Sandbox Scan VeracodeFlaw: High A Veracode Flaw, High severity

Comments

@veracode-workflow-app-preprod

// Get the users information
String sql = "SELECT username, real_name, blab_name FROM users WHERE username = '" + username + "'";
logger.info(sql);
myInfo = connect.prepareStatement(sql);
ResultSet myInfoResults = myInfo.executeQuery();
myInfoResults.next();
// Send these values to our View
model.addAttribute("hecklers", hecklers);
model.addAttribute("events", events);

Filename: UserController.java

Line: 506

CWE: 89 (Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ('SQL Injection'))

This database query contains a SQL injection flaw. The call to java.sql.PreparedStatement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input. An attacker could exploit this flaw to execute arbitrary SQL queries against the database. executeQuery() was called on the myInfo object, which contains tainted data. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, and java.sql.Statement.executeQuery. Avoid dynamically constructing SQL queries. Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP/nDon't know how to fix this? Don't know why this was reported?
Get Assistance from Veracode

@veracode-workflow-app-preprod veracode-workflow-app-preprod bot added Veracode Policy Scan A Veracode Flaw found during a Policy or Sandbox Scan VeracodeFlaw: High A Veracode Flaw, High severity labels Jul 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Veracode Policy Scan A Veracode Flaw found during a Policy or Sandbox Scan VeracodeFlaw: High A Veracode Flaw, High severity
Projects
None yet
Development

No branches or pull requests

0 participants
0