Stored_XSS issue exists @ src/main/webapp/vulnerability/UserDetails.jsp in branch master
Method rs=stmt.executeQuery at line 13 of src\main\webapp\vulnerability\UserDetails.jsp gets data from the database, for the executeQuery element. This element’s value then flows through the code without being properly filtered or encoded and is eventually displayed to the user in method out.print at line 16 of src\main\webapp\vulnerability\UserDetails.jsp. This may enable a Stored Cross-Site-Scripting attack.
Severity: High
CWE:79
Vulnerability details and guidance
Internal Guidance
Checkmarx
Lines: 13
Code (Line #13):
rs=stmt.executeQuery("select * from users where username='"+username+"'");