Skip to content

Update README.md

707d701
Select commit
Loading
Failed to load commit list.
Open

Js dynamic 2 #7

Update README.md
707d701
Select commit
Loading
Failed to load commit list.
Veracode-Workflow-App-QA / Veracode Static Code Analysis - Pipeline failed Jan 22, 2025 in 2m 9s

Veracode Static Code Analysis

Here's the summary of the scan result.

Annotations

Check warning on line 41 in github.com/govwa/vulnerability/sqli/function.go

See this annotation in the file changed.

@veracode-workflow-app-qa veracode-workflow-app-qa / Veracode Static Code Analysis - Pipeline

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Filename: github.com/govwa/vulnerability/sqli/function.go
Line: 41
CWE: 89 (Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

This database query contains a SQL injection flaw.  The call to database::sql::DB::Query() constructs a dynamic SQL query using a variable derived from untrusted input.  An attacker could exploit this flaw to execute arbitrary SQL queries against the database. The first argument to Query() contains tainted data from the variable getProfileSql. The tainted data originated from an earlier call to net.http.Request.FormValue.
Avoid dynamically constructing SQL queries.  Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query.  Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.
References: <a href="https://cwe.mitre.org/data/definitions/89.html">CWE</a> <a href="https://owasp.org/www-community/attacks/SQL_Injection">OWASP</a>