diff --git a/views/vulnerabilities/a1_injection/description.ejs b/views/vulnerabilities/a1_injection/description.ejs index f2ab2fd7..83cc09ab 100644 --- a/views/vulnerabilities/a1_injection/description.ejs +++ b/views/vulnerabilities/a1_injection/description.ejs @@ -11,9 +11,11 @@ String query = "SELECT * FROM accounts WHERE custID='" + request.getParameter("i The attacker modifies the `id` parameter value in her browser to send following: ``` -' or '1'='1. For example: +' or '1'='1 ``` +For example: + ``` http://example.com/app/accountView?id=' or '1'='1 ``` diff --git a/views/vulnerabilities/a1_injection/reference.ejs b/views/vulnerabilities/a1_injection/reference.ejs index 267dbdab..5d83eb98 100644 --- a/views/vulnerabilities/a1_injection/reference.ejs +++ b/views/vulnerabilities/a1_injection/reference.ejs @@ -1,4 +1,4 @@