You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
False positive in Java code due to missing check of parameter type (not every type can be exploited for SQL injections).
To Reproduce
publicList<Image> loadUserImages(intuserId) {
returnem.createQuery("Select i from Image i join i.user u where u.id='" + userId + "'").getResultList();
}
Expected behavior
No security finding if the only passed variable/parameter is an integer. Integers can't be abused for sql injections according to quick researches.
Priority
How important is this to you?
P0: blocking me from making progress
P1: this will block me in the near future
P2: annoying but not blocking me
The text was updated successfully, but these errors were encountered:
Name should be gitlab.find_sec_bugs.SQL_INJECTION_SPRING_JDBC-1.SQL_INJECTION_JPA-1.SQL_INJECTION_JDO-1.SQL_INJECTION_JDBC-1.SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE-1.SQL_INJECTION-1.SQL_INJECTION_HIBERNATE-1.SQL_INJECTION_VERTX-1.SQL_PREPARED_STATEMENT_GENERATED_FROM_NONCONSTANT_STRING-1
Describe the bug
False positive in Java code due to missing check of parameter type (not every type can be exploited for SQL injections).
To Reproduce
Expected behavior
No security finding if the only passed variable/parameter is an integer. Integers can't be abused for sql injections according to quick researches.
Priority
How important is this to you?
The text was updated successfully, but these errors were encountered: