Files
codeql/ruby/ql/test/query-tests/security/cwe-089/ArelInjection.rb
2024-02-26 10:09:33 +00:00

9 lines
306 B
Ruby

class PotatoController < ActionController::Base
def unsafe_action
name = params[:user_name]
# BAD: SQL statement constructed from user input
sql = Arel.sql("SELECT * FROM users WHERE name = #{name}")
sql = Arel::Nodes::SqlLiteral.new("SELECT * FROM users WHERE name = #{name}")
end
end