|
Finding Name
|
SELECT * FROM bar WHERE barianInt =
|
Severity of Finding
|
Medium
|
Description
|
This string appears to be an SQL statement. Carefully
scrutinize all SQL statements to ensure that they are not
vulnerable to SQL injection attacks. Use mitigation techniques
such as filtering for known-good characters
and using prepared statements.
|
Finding Locations
|
- In C:\server\tests.php, line 30 (context is $r2 = mysql_query("SELECT * FROM bar WHERE barianInt = ". (int)$_GET['sql_fp1']); /* false */)
|
Finding Name
|
SELECT * FROM bar WHERE barianStr = '
|
Severity of Finding
|
Medium
|
Description
|
This string appears to be an SQL statement. Carefully
scrutinize all SQL statements to ensure that they are not
vulnerable to SQL injection attacks. Use mitigation techniques
such as filtering for known-good characters
and using prepared statements.
|
Finding Locations
|
- In C:\server\tests.php, line 28 (context is $r1 = mysql_query("SELECT * FROM bar WHERE barianStr = '". $_GET['sql_tp1'] ."' "); /* true */)
- In C:\server\tests.php, line 29 (context is $r2 = mysql_query("SELECT * FROM bar WHERE barianStr = '". (string)$_GET['sql_tp2'] . "' "); /* true */)
- In C:\server\tests.php, line 31 (context is $r3 = mysql_query("SELECT * FROM bar WHERE barianStr = '". mysql_real_escape_string($_GET['sql_fp2']) . "' "); /* false */)
|
Finding Name
|
testpass
|
Severity of Finding
|
Medium
|
Description
|
There appears to be some text that may indicate security
sensitive functionality. Ensure you track any variables or
function calls here during manual source code review.
|
Finding Locations
|
- In C:\server\tests.php, line 15 (context is $db = mysql_connect("localhost", "testuser","testpass");)
|
Finding Name
|
testuser
|
Severity of Finding
|
Medium
|
Description
|
There appears to be some text that may indicate security
sensitive functionality. Ensure you track any variables or
function calls here during manual source code review.
|
Finding Locations
|
- In C:\server\tests.php, line 15 (context is $db = mysql_connect("localhost", "testuser","testpass");)
|
|