Ran a security scan against an URL and received the report below:
The vulnerability affects
/rolecall.cfm , bbb_id This is the rolecall.cfm code:
<cfscript> if (isDefined("url") and isDefined("url.bbb_id")) { if (url.dept_id eq -1) _include("sql", "getB"); else _include("sql", "getBNow"); } /*...*/ _include("sql", "getDPlaces"); /*Set up the model and go*/ model = { add = 1, edit = 0, remove = 0, places = getDPlaces }; </cfscript>
_includeis. Please add more information on how the query looks and if possible add an example query constructed with the above code.#url.dept_id#. Also, what is the source of#db.root#,#db.dept#, etc..? If they're user supplied they're also a sql injection risk. However, you can't use cfqueryparam on table names.#url...#, shouldn't be anywhere near a connection to a database. Definitely sanitize those values then put them in acfqueryparamto further mediate injection issues. And you'll probably also get flagged for using dynamic table names. You should definitely, at the very least, validate those entries against a whitelist of acceptable tables.