Skip to content

🔒 [DevSync] [E2E Test] SQL Injection in user authentication - 00:17 #14

@prakhar1009

Description

@prakhar1009

Security Finding - DevSync RTO

RTO ID: 2b0168b5-9345-42c4-8e28-2c40d46e34b6
Severity: HIGH
Status: created
Service: backend-api

Description

Vulnerability Details

A SQL injection vulnerability was detected in the user authentication module.

Location: backend/auth/login.py:45
Severity: High
CWE: CWE-89 (SQL Injection)

Attack Vector

User-supplied input is concatenated directly into SQL query without sanitization.

Proof of Concept

username = "admin' OR '1'='1"
query = f"SELECT * FROM users WHERE username = '{username}'"

Remediation

Use parameterized queries or an ORM to prevent SQL injection.

Details

  • Source: N/A
  • Type: vulnerability
  • File: N/A

Links


This issue was automatically created by DevSync

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions