Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') #296

Open
my-veracode bot opened this issue Mar 14, 2021 · 0 comments
Labels
Severity: High A Veracode Flaw, High severity Veracode A Veracode identified issue

Comments

@my-veracode
Copy link

my-veracode bot commented Mar 14, 2021

Description:

This database query contains a SQL injection flaw. The call to java.sql.PreparedStatement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input. An attacker could exploit this flaw to execute arbitrary SQL queries against the database. executeQuery() was called on the blabberQuery object, which contains tainted data. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.

Avoid dynamically constructing SQL queries. Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.

Identifiers:

@my-veracode my-veracode bot added Severity: High A Veracode Flaw, High severity Veracode A Veracode identified issue labels Mar 14, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Severity: High A Veracode Flaw, High severity Veracode A Veracode identified issue
Projects
None yet
Development

No branches or pull requests

0 participants