Skip to content

Commit 04dc94b

Browse files
committed
Continue iterating on tests
1 parent 1f58616 commit 04dc94b

File tree

3 files changed

+26
-30
lines changed

3 files changed

+26
-30
lines changed

sql/injection/testdata/src/github.com/sqreen/go-dvwa/vulnerable/sql.go

Lines changed: 0 additions & 23 deletions
This file was deleted.
Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,21 @@
1-
package main
1+
package v
22

33
import (
4+
"database/sql"
45
"net/http"
5-
6-
"github.com/sqreen/go-dvwa/vulnerable"
6+
"v/nested"
77
)
88

99
func main() {
10-
db, _ := vulnerable.PrepareSQLDB()
11-
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
12-
vulnerable.GetProducts(r.Context(), db, r.FormValue("category"))
10+
db, err := sql.Open("sqlite3", ":memory:")
11+
if err != nil {
12+
panic(err)
13+
}
14+
mux := http.NewServeMux()
15+
16+
mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
17+
nested.Run(db, r.URL.Query().Get("name"))
1318
})
14-
http.ListenAndServe(":8080", nil)
19+
20+
http.ListenAndServe(":8080", mux)
1521
}
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
package nested
2+
3+
import (
4+
"database/sql"
5+
)
6+
7+
func Run(db *sql.DB, query string) error {
8+
_, err := db.Query(query) // want "potential sql injection"
9+
if err != nil {
10+
return err
11+
}
12+
return nil
13+
}

0 commit comments

Comments
 (0)