This exercise demonstrates the importance of access control in a database environment.
Follow the instructions at this link: Setup Instructions
- Retrieve data from the user's table using SQL Injection.
- Secure the vulnerability without changing the code. Only change the database configuration.