Files
codeql/ruby/ql/test/query-tests/security/cwe-089/ArelInjection.rb
2022-11-10 14:11:14 +00:00

8 lines
224 B
Ruby

class PotatoController < ActionController::Base
def unsafe_action
name = params[:user_name]
# BAD: SQL statement constructed from user input
sql = Arel.sql("SELECT * FROM users WHERE name = #{name}")
end
end