julz0815 / test-action

0 stars 1 forks source link

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') [VID:89:com/veracode/verademo/controller/BlabController.java:490] #820

Open github-actions[bot] opened 6 months ago

github-actions[bot] commented 6 months ago

https://github.com/julz0815/test-action/blob/37a01908151c347054c82f620f4aee87f09d0b4d/com/veracode/verademo/controller/BlabController.java#L485-L495

Filename: com/veracode/verademo/controller/BlabController.java

Line: 490

CWE: 89 (Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

This database query contains a SQL injection flaw. The call to java.sql.PreparedStatement.executeQuery() constructs a dynamic SQL query using a variable derived from untrusted input. An attacker could exploit this flaw to execute arbitrary SQL queries against the database. executeQuery() was called on the blabberQuery object, which contains tainted data. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry. Avoid dynamically constructing SQL queries. Instead, use parameterized prepared statements to prevent the database from interpreting the contents of bind variables as part of the query. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP

github-actions[bot] commented 6 months ago

Veracode issue link to PR: https://github.com/julz0815/test-action/pull/809

github-actions[bot] commented 6 months ago

Veracode issue link to PR: https://github.com/julz0815/test-action/pull/829

github-actions[bot] commented 6 months ago

Veracode issue link to PR: https://github.com/julz0815/test-action/pull/830

github-actions[bot] commented 6 months ago

Veracode issue link to PR: https://github.com/julz0815/test-action/pull/830

github-actions[bot] commented 6 months ago

Veracode issue link to PR: https://github.com/julz0815/test-action/pull/830