SQL_Injection issue exists @ website/comments/preview_comment.php in branch master
Method <?php at line 1 of website\comments\preview_comment.php gets user input from the _POST element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method get_picture at line 110 of website\include\pictures.php. This may enable an SQL Injection attack.
SQL_Injection issue exists @ website/comments/preview_comment.php in branch master
Method <?php at line 1 of website\comments\preview_comment.php gets user input from the _POST element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method get_picture at line 110 of website\include\pictures.php. This may enable an SQL Injection attack.
Severity: High
CWE:89
Vulnerability details and guidance
Checkmarx
Lines: 18 24
Code (Line #18):
Code (Line #24):