Skip to content

Validate lookup_user as integer to prevent SQL injection in ws.php#112

Open
zeropath-ai-staging[bot] wants to merge 1 commit intoindirect_sqli_testfrom
zvuln_fix_cf68678f
Open

Validate lookup_user as integer to prevent SQL injection in ws.php#112
zeropath-ai-staging[bot] wants to merge 1 commit intoindirect_sqli_testfrom
zvuln_fix_cf68678f

Conversation

@zeropath-ai-staging
Copy link

Successful SQL injection could expose sensitive user data or allow unauthorized access. The get_user_by_id function in ws.php (lines 22-37) directly uses the lookup_user GET parameter without sanitization, which causes unsanitized data to be passed directly into a SQL query. An attacker could manipulate this parameter to inject arbitrary SQL code, potentially extracting user credentials or modifying application data.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants