Any communication made with the database is vulnerable to SQL Injection

Issue #129 new
DhelthaX created an issue

Analyzing the source code of the application, we note the possibility of breaking the database queries without any type of authentication, so it is possible to manipulate them, making them bring unexpected results by the application, or even bypass the authentication and escalate privileges.

Comments (0)

  1. Log in to comment