Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[A1][Mitigation] Use prepared statement to avoid injection in SQL queries. #29

Closed
wants to merge 2 commits into from

Conversation

Chavao
Copy link

@Chavao Chavao commented Jan 8, 2019

Running sqlmap with command:

sqlmap -r postRequest.txt

The output is: all tested parameters do not appear to be injectable.

Full output file sqlmap_output.txt.

Copy link
Contributor

@spimpaov spimpaov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice job! Your solution mitigates SQL Injection from the application.
If you want to go even further, consider using db.Prepare function too to potentially improve the performance of the queries that need to be executed often.

@rafaveira3
Copy link
Contributor

@Chavao , sounds good to me as well! Awesome!

On future commits we will mention this PR as a mitigation solution! 🔒

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A1-OWASP-2017 CopyNPaste API mitigation solution 🔒 This is a possible way to fix this vulnerability
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants