cxronen / OpenRoom

Other
0 stars 0 forks source link

CX SQL_Injection @ admin/report-monthly.php [master] #77

Open cxronen opened 4 years ago

cxronen commented 4 years ago

SQL_Injection issue exists @ admin/report-monthly.php in branch master

Method <?php at line 1 of admin\report-monthly.php gets user input from the _REQUEST element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method <?php at line 1 of admin\report-monthly.php. This may enable an SQL Injection attack.

Severity: High

CWE:89

Checkmarx

Lines: 24 25


Code (Line #24):

        $orderbywhat = isset($_REQUEST["orderbywhat"])?$_REQUEST["orderbywhat"]:" ";

Code (Line #25):

        $direction = isset($_REQUEST["direction"])?$_REQUEST["direction"]:" ";

cxronen commented 4 years ago

Issue still exists.

cxronen commented 4 years ago

Issue still exists.

cxronen commented 4 years ago

Issue still exists.

cxronen commented 4 years ago

Issue still exists.

cxronen commented 4 years ago

Issue still exists.

cxronen commented 4 years ago

Issue still exists.

cxronen commented 4 years ago

Issue still exists.

cxronen commented 4 years ago

Issue still exists.