-
Notifications
You must be signed in to change notification settings - Fork 250
Closed
Description
So I tried to add a tox.ini with all the versions of py3 + pypy3, due to the results file I realized with 3.6 you get:
2 vulnerabilities found:
Vulnerability 1:
File: example/vulnerable_code/sql/sqli.py
> User input at line 26, trigger word "get(":
param = request.args.get('param', 'not set')
File: example/vulnerable_code/sql/sqli.py
> reaches line 27, trigger word "execute(":
result = db.engine.execute(param)
Vulnerability 2:
File: example/vulnerable_code/sql/sqli.py
> User input at line 33, trigger word "get(":
param = request.args.get('param', 'not set')
File: example/vulnerable_code/sql/sqli.py
> reaches line 36, trigger word "filter(":
result = session.query(User).filter('username={}'.format(param))
whereas below 3.6 you get
2 vulnerabilities found:
Vulnerability 1:
File: example/vulnerable_code/sql/sqli.py
> User input at line 33, trigger word "get(":
param = request.args.get('param', 'not set')
File: example/vulnerable_code/sql/sqli.py
> reaches line 36, trigger word "filter(":
result = session.query(User).filter('username={}'.format(param))
Vulnerability 2:
File: example/vulnerable_code/sql/sqli.py
> User input at line 26, trigger word "get(":
param = request.args.get('param', 'not set')
File: example/vulnerable_code/sql/sqli.py
> reaches line 27, trigger word "execute(":
result = db.engine.execute(param)
notice the difference? It's just an order problem
This would explain why I had to change the results
file to get Travis CI to pass in #23
Metadata
Metadata
Assignees
Labels
No labels