Question
Figure 5 Explain why the code given in Figure 5 above , is vulnerable to SQL Injection and cross-site scripting attacks. Give an example scenario
Figure 5
$servername = "localhost";
$username = "me";
$password = "!myPa$$";
$dbname = "mydb";
if(isset($_POST["uname"], $_POST["upass"])) {
$conn = new mysqli($servername, $username, $password, $dbname);
if (!$conn->connect_error) {
die("Connection failed: " . $conn->connect_error);
}
$query = "select * from user where uname='$_POST[uname]' AND upass='$_POST[upass]'";
$result = $conn->query($query);
}
?>
Explain why the code given in Figure 5 above, is vulnerable to SQL Injection and cross-site scripting attacks.
Give an example scenario to demonstrate your analysis in the previous question.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started