Skip to content

Demo of a SQL injection vulnerability on a small SpringBoot project

Notifications You must be signed in to change notification settings

SonarSource-Demos/spring-demo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Read Me First

This project demonstrate a simple SQL injection vulnerability on a SpringBoot project The project runs a servlet serving two endpoints:

  • '/' with a simple Hello the world answer
  • '/person/address' which maps the 'name' GET parameter to a SQL query (the vulnerability)
  • the initial DB setup has a PEOPLE table populated with one entry for the name 'foo'
  • as default, the application listens on port 8080 and also maps the H2 DB console: http://localhost:8080/h2-console

Credits to @jeff-zapotoczny-sonarsource for the initial implementation

Reference Documentation

For further reference, please consider the following sections:

Guides

The following guides illustrate how to use some features concretely:

About

Demo of a SQL injection vulnerability on a small SpringBoot project

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published