You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.
Database queries being formed with concatenation of strings/stringified values
In smart-contract module, Badge.txt file, query is constructed using string concatenation and uses parameters directly, which may lead to query injection issues.
The attack vector is a peer node in the blockchain community - which can send malicious parameters causing SQL injection.
$1 is used by concatenation
Line 16: const entity = await query("SELECT", "entities", "WHERE entity = $1;", [from]);
$1 is used by concatenation
Line 25: const institution = await query("SELECT", "institutions", "WHERE institution = $1;"
The text was updated successfully, but these errors were encountered:
Database queries being formed with concatenation of strings/stringified values
In smart-contract module, Badge.txt file, query is constructed using string concatenation and uses parameters directly, which may lead to query injection issues.
The attack vector is a peer node in the blockchain community - which can send malicious parameters causing SQL injection.
$1 is used by concatenation
Line 16: const entity = await query("SELECT", "entities", "WHERE entity = $1;", [from]);
$1 is used by concatenation
Line 25: const institution = await query("SELECT", "institutions", "WHERE institution = $1;"
The text was updated successfully, but these errors were encountered: