SQL_Injection issue exists @ vulnerabilities/sqli_blind/source/impossible.php in branch master
Method <?php at line 1 of vulnerabilities\sqli_blind\source\impossible.php gets user input from the _GET element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method <?php at line 1 of vulnerabilities\sqli_blind\source\impossible.php. This may enable an SQL Injection attack.
SQL_Injection issue exists @ vulnerabilities/sqli_blind/source/impossible.php in branch master
Method <?php at line 1 of vulnerabilities\sqli_blind\source\impossible.php gets user input from the _GET element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method <?php at line 1 of vulnerabilities\sqli_blind\source\impossible.php. This may enable an SQL Injection attack.
Severity: High
CWE:89
Vulnerability details and guidance
Internal Guidance
Checkmarx
Training Recommended Fix
Lines: 8
Code (Line #8):