we’re using SonarQube 8.7 in our project and wondering why the scan dont pick up sql injections.
Rule: PHP Sonar way - Database queries should not be vulnerable to injection attacks
Just a worst case example:
Lets think we have a class db_access which handles the querys and then we have a:
$result = db_access->query_first("SELECT * FROM bla_table WHERE user_id="._GET[‘id’].");
This may depend on the context and the DB you’re using. Could you send a longer code snippet as a full standalone reproducer ? (Open DB and run SQL Query using _GET[] input).