Description
CWE: 643 Xpath Injection
BadSource: connect_tcp Read data using an outbound tcp connection
GoodSource: A hardcoded string
Sinks:
GoodSink: validate input through StringEscapeUtils
BadSink : user input is used without validate
Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(IO.STATIC_FINAL_FIVE!=5)
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.