From 1c7ef9650df22988476e5bf09056787273fa28f8 Mon Sep 17 00:00:00 2001 From: Sweetbread Date: Fri, 31 Jan 2025 16:23:22 +0300 Subject: [PATCH] style: Prettify HTML --- templates/_head.html | 2 +- templates/_header.html | 7 ++++++- templates/sql-injection.html | 2 +- 3 files changed, 8 insertions(+), 3 deletions(-) diff --git a/templates/_head.html b/templates/_head.html index e102e5f..e2b6aa9 100644 --- a/templates/_head.html +++ b/templates/_head.html @@ -5,7 +5,7 @@ + - Попакошька \ No newline at end of file diff --git a/templates/_header.html b/templates/_header.html index 03be292..a990b97 100644 --- a/templates/_header.html +++ b/templates/_header.html @@ -1,3 +1,8 @@
- +
diff --git a/templates/sql-injection.html b/templates/sql-injection.html index ab6856d..b08ceff 100644 --- a/templates/sql-injection.html +++ b/templates/sql-injection.html @@ -8,7 +8,7 @@
login = request.form['login']
 password = request.form['pass']
 cursor = get_db().cursor()
-cursor.execute(f'SELECT * FROM Users WHERE login == "{login}" AND password == "{password}"')


+cursor.execute(f'SELECT * FROM Users WHERE login == "{login}" AND password == "{password}"')

Примерно так выглядит сообтвествующий код, который позволяет использовать уязвимость