Hi Simon,
The application I am scanning is a POC app, and is vulnerable to SQL injection. My understanding is the application is vulnerable to SQL injection. High threshold Is expected give some real SQL injection issues. Could you please correct me if there is some misunderstanding.
If Low threshold only gives SQL injection issues, we need to correct our zap scan policy for desktop and automation solution also.
Technical details:
I am directly passing User input to sql query to check ZAP results. Below is the query that works correctly
SqlCommand cmd = new SqlCommand("insert into TEMP_PRO_SQL_INJECTION values ('" + txtUserName.Text + "','" + txtLocation.Text + "')", sqlConnection);
Regards,
RB