We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 657686b commit 1aec7fcCopy full SHA for 1aec7fc
1 file changed
powershell/ql/src/queries/security/cwe-089/examples/SqlInjection.ps1
@@ -4,7 +4,7 @@ param(
4
5
# BAD: The user input is directly interpolated into the SQL query string
6
$query1 = "SELECT * FROM users WHERE name = '$userinput'"
7
-Invoke-Sqlcmd -ServerInstance "MyServer" -Database "MyDatabase" -Query $query
+Invoke-Sqlcmd -ServerInstance "MyServer" -Database "MyDatabase" -Query $query1
8
9
# GOOD: Using parameters to prevent SQL injection
10
$query2 = "SELECT * FROM users WHERE name = @username"
@@ -13,4 +13,4 @@ $params = @{
13
username = $userinput
14
}
15
16
-Invoke-Sqlcmd -ServerInstance "MyServer" -Database "MyDatabase" -Query $query -QueryParameters $params
+Invoke-Sqlcmd -ServerInstance "MyServer" -Database "MyDatabase" -Query $query2 -QueryParameters $params
0 commit comments