We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6af2b67 commit 104ceb9Copy full SHA for 104ceb9
2/challenge-1/sql-injection.py
@@ -15,4 +15,8 @@ def show_user(request, username):
15
# BAD -- Manually quoting placeholder (%s)
16
cursor.execute("SELECT * FROM users WHERE username = '%s'" % username)
17
user = cursor.fetchone()
18
+
19
+ # GOOD - string literal
20
+ cursor.execute("SELECT * FROM users WHERE username = 'johndoe'")
21
+ user = cursor.fetchone()
22
urlpatterns = [url(r'^users/(?P<username>[^/]+)$', show_user)]
0 commit comments