Second_Order_SQL_Injection issue exists @ or-reserve.php in branch master
Method <?php at line 1 of or-reserve.php gets database data from the _SESSION_username element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method <?php at line 1 of or-reserve.php. This may enable an Second-Order SQL Injection attack.
Second_Order_SQL_Injection issue exists @ or-reserve.php in branch master
Method <?php at line 1 of or-reserve.php gets database data from the _SESSION_username element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method <?php at line 1 of or-reserve.php. This may enable an Second-Order SQL Injection attack.
Severity: High
CWE:89
Checkmarx
Lines: 358 7 365
Code (Line #358):
Code (Line #7):
Code (Line #365):