Unsanitized external input in SQL query
Overview
Rule ID:
java_lang_sqli
Applicable Languages: Java
Weakness ID: CWE-89
Description
Using unsanitized data, such as user input, request data, or any externally influenced data in SQL queries exposes your application to SQL injection attacks. This vulnerability occurs when external data is directly incorporated into SQL statements without adequate sanitization, enabling attackers to manipulate queries and potentially access or alter data.
Remediation Guidelines
Avoid including unsanitized input in SQL queries, as this can lead to SQL injection vulnerabilities.
Use prepared statements to safely incorporate external input into SQL queries.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated