High | SQL Injection |
CWE-89
|
SqlInjectionLesson6a.java:74
| 3 | 2024-05-29 07:16pm |
Vulnerable Code
|
usedUnion = false; |
|
} |
|
try (Statement statement = |
|
connection.createStatement( |
|
ResultSet.TYPE_SCROLL_INSENSITIVE, ResultSet.CONCUR_READ_ONLY)) { |
|
ResultSet results = statement.executeQuery(query); |
3 Data Flow/s detected
View Data Flow 1
|
public AttackResult attack(@RequestParam("userid_sql_only_input_validation") String userId) { |
|
AttackResult attackResult = lesson6a.injectableQuery(userId); |
|
public AttackResult injectableQuery(String accountName) { |
|
query = "SELECT * FROM user_data WHERE last_name = '" + accountName + "'"; |
|
ResultSet results = statement.executeQuery(query); |
View Data Flow 2
|
public AttackResult completed(@RequestParam(value = "userid_6a") String userId) { |
|
return injectableQuery(userId); |
|
public AttackResult injectableQuery(String accountName) { |
|
query = "SELECT * FROM user_data WHERE last_name = '" + accountName + "'"; |
|
ResultSet results = statement.executeQuery(query); |
View Data Flow 3
|
public AttackResult attack( |
|
userId = userId.toUpperCase().replace("FROM", "").replace("SELECT", ""); |
|
AttackResult attackResult = lesson6a.injectableQuery(userId); |
|
public AttackResult injectableQuery(String accountName) { |
|
query = "SELECT * FROM user_data WHERE last_name = '" + accountName + "'"; |
|
ResultSet results = statement.executeQuery(query); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
SqlInjectionLesson10.java:71
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
try (Connection connection = dataSource.getConnection()) { |
|
try { |
|
Statement statement = |
|
connection.createStatement( |
|
ResultSet.TYPE_SCROLL_INSENSITIVE, ResultSet.CONCUR_READ_ONLY); |
|
ResultSet results = statement.executeQuery(query); |
1 Data Flow/s detected
|
public AttackResult completed(@RequestParam String action_string) { |
|
return injectableQueryAvailability(action_string); |
|
protected AttackResult injectableQueryAvailability(String action) { |
|
String query = "SELECT * FROM access_log WHERE action LIKE '%" + action + "%'"; |
|
ResultSet results = statement.executeQuery(query); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
SqlInjectionLesson5.java:80
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
protected AttackResult injectableQuery(String query) { |
|
try (Connection connection = dataSource.getConnection()) { |
|
try (Statement statement = |
|
connection.createStatement( |
|
ResultSet.TYPE_SCROLL_INSENSITIVE, ResultSet.CONCUR_UPDATABLE)) { |
|
statement.executeQuery(query); |
1 Data Flow/s detected
|
public AttackResult completed(String query) { |
|
return injectableQuery(query); |
|
protected AttackResult injectableQuery(String query) { |
|
statement.executeQuery(query); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
Servers.java:72
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
public List<Server> sort(@RequestParam String column) throws Exception { |
|
List<Server> servers = new ArrayList<>(); |
|
|
|
try (var connection = dataSource.getConnection()) { |
|
try (var statement = |
|
connection.prepareStatement( |
1 Data Flow/s detected
|
public List<Server> sort(@RequestParam String column) throws Exception { |
|
"select id, hostname, ip, mac, status, description from SERVERS where status <> 'out" |
|
connection.prepareStatement( |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
SqlInjectionLesson3.java:63
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
try (Connection connection = dataSource.getConnection()) { |
|
try (Statement statement = |
|
connection.createStatement(TYPE_SCROLL_INSENSITIVE, CONCUR_READ_ONLY)) { |
|
Statement checkStatement = |
|
connection.createStatement(TYPE_SCROLL_INSENSITIVE, CONCUR_READ_ONLY); |
|
statement.executeUpdate(query); |
1 Data Flow/s detected
|
public AttackResult completed(@RequestParam String query) { |
|
return injectableQuery(query); |
|
protected AttackResult injectableQuery(String query) { |
|
statement.executeUpdate(query); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
SqlInjectionLesson4.java:62
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
|
|
protected AttackResult injectableQuery(String query) { |
|
try (Connection connection = dataSource.getConnection()) { |
|
try (Statement statement = |
|
connection.createStatement(TYPE_SCROLL_INSENSITIVE, CONCUR_READ_ONLY)) { |
|
statement.executeUpdate(query); |
1 Data Flow/s detected
|
public AttackResult completed(@RequestParam String query) { |
|
return injectableQuery(query); |
|
protected AttackResult injectableQuery(String query) { |
|
statement.executeUpdate(query); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
SqlInjectionChallenge.java:69
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
|
|
try (Connection connection = dataSource.getConnection()) { |
|
String checkUserQuery = |
|
"select userid from sql_challenge_users where userid = '" + username_reg + "'"; |
|
Statement statement = connection.createStatement(); |
|
ResultSet resultSet = statement.executeQuery(checkUserQuery); |
1 Data Flow/s detected
|
public AttackResult registerNewUser( |
|
"select userid from sql_challenge_users where userid = '" + username_reg + "'"; |
|
ResultSet resultSet = statement.executeQuery(checkUserQuery); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
Assignment5.java:60
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
if (!"Larry".equals(username_login)) { |
|
return failed(this).feedback("user.not.larry").feedbackArgs(username_login).build(); |
|
} |
|
try (var connection = dataSource.getConnection()) { |
|
PreparedStatement statement = |
|
connection.prepareStatement( |
1 Data Flow/s detected
|
public AttackResult login( |
|
"select password from challenge_users where userid = '" |
|
connection.prepareStatement( |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
SqlInjectionLesson5a.java:67
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
query = |
|
"SELECT * FROM user_data WHERE first_name = 'John' and last_name = '" + accountName + "'"; |
|
try (Statement statement = |
|
connection.createStatement( |
|
ResultSet.TYPE_SCROLL_INSENSITIVE, ResultSet.CONCUR_UPDATABLE)) { |
|
ResultSet results = statement.executeQuery(query); |
1 Data Flow/s detected
|
public AttackResult completed( |
|
return injectableQuery(account + " " + operator + " " + injection); |
|
protected AttackResult injectableQuery(String accountName) { |
|
"SELECT * FROM user_data WHERE first_name = 'John' and last_name = '" + accountName + "'"; |
|
ResultSet results = statement.executeQuery(query); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
| |
High | SQL Injection |
CWE-89
|
SqlInjectionLesson5b.java:86
| 1 | 2024-05-29 07:16pm |
Vulnerable Code
|
|
|
query.setInt(1, count); |
|
// String query = "SELECT * FROM user_data WHERE Login_Count = " + login_count + " and userid |
|
// = " + accountName, ; |
|
try { |
|
ResultSet results = query.executeQuery(); |
1 Data Flow/s detected
|
public AttackResult completed( |
|
return injectableQuery(login_count, userid); |
|
protected AttackResult injectableQuery(String login_count, String accountName) { |
|
String queryString = "SELECT * From user_data WHERE Login_Count = ? and userid= " + accountName; |
|
connection.prepareStatement( |
|
ResultSet results = query.executeQuery(); |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
|
Code Security Report
Scan Metadata
Latest Scan: 2024-11-01 02:40pm
Total Findings: 33 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 425
Detected Programming Languages: 2 (Java*, JavaScript / TypeScript*)
Most Relevant Findings
CWE-89
SqlInjectionLesson6a.java:74
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Lines 69 to 74 in b4e2b56
3 Data Flow/s detected
View Data Flow 1
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidation.java
Line 47 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidation.java
Line 51 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 62 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 66 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 74 in b4e2b56
View Data Flow 2
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 56 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 57 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 62 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 66 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 74 in b4e2b56
View Data Flow 3
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidationOnKeywords.java
Line 51 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidationOnKeywords.java
Line 53 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidationOnKeywords.java
Line 57 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 62 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 66 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java
Line 74 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
SqlInjectionLesson10.java:71
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java
Lines 66 to 71 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java
Line 58 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java
Line 59 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java
Line 62 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java
Line 64 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java
Line 71 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
SqlInjectionLesson5.java:80
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5.java
Lines 75 to 80 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5.java
Line 70 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5.java
Line 72 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5.java
Line 75 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5.java
Line 80 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
Servers.java:72
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/Servers.java
Lines 67 to 72 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/Servers.java
Line 67 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/Servers.java
Line 73 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/Servers.java
Line 72 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
SqlInjectionLesson3.java:63
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java
Lines 58 to 63 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java
Line 53 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java
Line 54 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java
Line 57 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java
Line 63 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
SqlInjectionLesson4.java:62
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java
Lines 57 to 62 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java
Line 54 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java
Line 55 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java
Line 58 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java
Line 62 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
SqlInjectionChallenge.java:69
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java
Lines 64 to 69 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java
Line 56 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java
Line 67 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java
Line 69 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
Assignment5.java:60
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java
Lines 55 to 60 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java
Line 50 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java
Line 61 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java
Line 60 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
SqlInjectionLesson5a.java:67
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java
Lines 62 to 67 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java
Line 54 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java
Line 56 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java
Line 59 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java
Line 63 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java
Line 67 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
CWE-89
SqlInjectionLesson5b.java:86
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5b.java
Lines 81 to 86 in b4e2b56
1 Data Flow/s detected
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5b.java
Line 55 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5b.java
Line 58 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5b.java
Line 61 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5b.java
Line 62 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5b.java
Line 65 in b4e2b56
MyDemoCorp/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5b.java
Line 86 in b4e2b56
● Training
▪ Secure Code Warrior SQL Injection Training
● Videos
▪ Secure Code Warrior SQL Injection Video
● Further Reading
▪ OWASP SQL Injection Prevention Cheat Sheet
▪ OWASP SQL Injection
▪ OWASP Query Parameterization Cheat Sheet
Findings Overview