Posts

Showing posts with the label Common Insecure Coding Examples

Common Insecure Coding Examples

1. Insecure Authentication : #  Bad Code (SCSS) : User's credentials are not hashed or protected, which can allow an attacker to steal user credentials. username = request.POST['username'] password = request.POST['password'] query = "SELECT * FROM users WHERE username = '{}' AND password = '{}'".format(username, password) cursor.execute(query) #  Good Code (SCSS) :    User's password is hashed using a secure hashing algorithm before being used in the SQL query.  username = request.POST['username'] password = request.POST['password'] hashed_password = hash_password(password) query = "SELECT * FROM users WHERE username = %s AND password = %s" cursor.execute(query, (username, hashed_password))   2. SQL Injection :  #  Bad Code (CSS):  User input is directly concatenated into the SQL query, which can allow an attacker to manipulate the query and execute unintended actions. In addition, all user...