Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerabilities Dashboard - Code #144

Closed
nullify-proactiveops bot opened this issue Oct 25, 2024 · 1 comment
Closed

Vulnerabilities Dashboard - Code #144

nullify-proactiveops bot opened this issue Oct 25, 2024 · 1 comment

Comments

@nullify-proactiveops
Copy link

nullify-proactiveops bot commented Oct 25, 2024

Severity Threshold: πŸ”΅ MEDIUM

1 Potential vulnerability sources found within this repo

πŸ”΄ CRITICAL 🟑 HIGH πŸ”΅ MEDIUM βšͺ LOW
1 0 0 0

ID: 01JB0Q1PJ1QGZX8SAEBX3E99H1 Language: Go Severity: πŸ”΄ CRITICAL CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

SQL Injection is a critical vulnerability that can lead to data or system compromise. By dynamically generating SQL query strings, user input may be able to influence the logic of the SQL statement. This could lead to an adversary accessing information they should not have access to or in some circumstances, being able to execute OS functionality or code.
Read more:
https://cwe.mitre.org/data/definitions/89.html

rego.Query("data."+policyName),

Reply with /nullify to interact with me like another developer

@nullify-proactiveops nullify-proactiveops bot pinned this issue Oct 25, 2024
@skwashd
Copy link
Contributor

skwashd commented Oct 25, 2024

/nullify this isn't a SQL query. It is an Open Policy Agent query. The concatenated string is setting the name of query properly.

@skwashd skwashd closed this as completed Jan 1, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant