-
Notifications
You must be signed in to change notification settings - Fork 12
Open
Labels
buggy-fileFiles that are intentionally buggy or brokenFiles that are intentionally buggy or brokenneeds-reviewNeeds human reviewNeeds human reviewsecuritySecurity related issuesSecurity related issues
Description
As a developer
I want to remove string interpolation from SQL queries in src/javascript/backend/database/queries.js and use parameterized queries
So that the application is not vulnerable to SQL injection attacks
Acceptance Criteria
- Replace constructs like
const query = `SELECT * FROM users WHERE username = '${username}'`;with parameterized queries provided by the DB library (e.g.,this.conn.query('SELECT * FROM users WHERE username = ?', [username])).
Details
Found usage of dynamic SQL building via template literals which permits injection. The file contains: SELECT * FROM users WHERE username = '${username}'.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
buggy-fileFiles that are intentionally buggy or brokenFiles that are intentionally buggy or brokenneeds-reviewNeeds human reviewNeeds human reviewsecuritySecurity related issuesSecurity related issues