HTTP Request Parameter Concatenation
Request parameters from forms, query strings, or path variables are directly concatenated into SQL strings.
SQL injection vulnerability where HTTP request parameters are concatenated into SQL text without parameter binding, potentially allowing attackers to expose or corrupt data, execute unintended queries, escalate privileges, and compromise the database and dependent services through untrusted characters that can break out of string context and alter the query structure.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Request parameters from forms, query strings, or path variables are directly concatenated into SQL strings.
Sourcery automatically identifies sql injection from http request data in manual sql string in play and many other security issues in your codebase.