we’re using SonarQube 8.7 in our project and wondering why the scan dont pick up sql injections.
Rule: PHP Sonar way - Database queries should not be vulnerable to injection attacks
Just a worst case example:
Lets think we have a class db_access which handles the querys and then we have a:
$result = db_access->query_first("SELECT * FROM bla_table WHERE user_id="._GET[‘id’].");
Why is the rule not able to find it?