diff --git a/routes.py b/routes.py index 25dde68..8c4338e 100644 --- a/routes.py +++ b/routes.py @@ -36,7 +36,7 @@ def login(): db = get_db() # Intentionally vulnerable to SQL Injection in the username field - query = f"SELECT * FROM users WHERE username = '{username}' AND password = '{hashed_password}'" + query = f"SELECT * FROM users WHERE username = '{username}' AND password = '{hashed_password}' " print(f"Executing SQL Query: {query}") # Debug the SQL query being executed result = db.execute(query).fetchone() @@ -81,11 +81,11 @@ def search_user(): elif 'delete_user' in request.form: # Delete user user_id = request.form.get('user_id_to_delete') - admin_user = db.execute("SELECT * FROM users WHERE id = ? AND username = 'admin'", (user_id,)).fetchone() + admin_user = db.execute("SELECT * FROM users WHERE id = ? AND username = 'admin' ", (user_id,)).fetchone() if admin_user: flash("Cannot delete the admin user!") else: - db.execute("DELETE FROM users WHERE id = ?", (user_id,)) + db.execute("DELETE FROM users WHERE id = ? ", (user_id,)) db.commit() flash("User deleted successfully!") @@ -93,7 +93,7 @@ def search_user(): # Search user by ID user_id = request.form.get('user_id') try: - query = f"SELECT * FROM users WHERE id = {user_id}" + query = f"SELECT * FROM users WHERE id = {user_id} " print(f"Executing SQL Query: {query}") result = db.execute(query).fetchall() if result: @@ -235,4 +235,4 @@ def create_ticket(): @app.route('/admin/tickets') def view_tickets(): - return render_template('admin_tickets.html', tickets=tickets) \ No newline at end of file + return render_template('admin_tickets.html', tickets=tickets) diff --git a/templates/xss_demo.html b/templates/xss_demo.html index e5145e8..1af1e24 100644 --- a/templates/xss_demo.html +++ b/templates/xss_demo.html @@ -60,12 +60,12 @@