Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

For my question I have two samples of my code. I need to know what vulnerability I've got in each of them, how this could

For my question I have two samples of my code. I need to know what vulnerability I've got in each of them, how this could potentially be exploited by an attacker, as well as what fixes I could implement to fix it. Can you please include the fixes written in C?

Part one of code:

#include string.h #define BUFFER LENGTH 15 void chk permission(char *str) { char buf[BUFFER LENGTH]; int pass = 0; strcpy(buf,Buffer); if(strcmp(buf, savedPassword) == 0) //match found { pass = 1; } if(pass) { grant permission(); } } int main (int argc, char argv) { chk permission(argv[1]); }

part 2 of code: (Pretty sure this is vulnerable to sql injection attack, but please let me know if I am right)

public static void main( String args[] ) { try { //... Database connection created and established .... ...// String sql query = session.createQuery(SELECT * FROM accounts WHERE custID= + request.getParameter(id) + ); stmt.executeQuery(sql query); c.commit(); } catch ( Exception e ) { System.exit(0); } }

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Online Market Research Cost Effective Searching Of The Internet And Online Databases

Authors: John F. Lescher

1st Edition

0201489295, 978-0201489293

More Books

Students also viewed these Databases questions

Question

a neglect of quality in relationship to international competitors;

Answered: 1 week ago