Description
CWE: 643 Xpath Injection
BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter())
GoodSource: A hardcoded string
Sinks:
GoodSink: validate input through StringEscapeUtils
BadSink : user input is used without validate
Flow Variant: 13 Control flow: if(IO.STATIC_FINAL_FIVE==5) and if(IO.STATIC_FINAL_FIVE!=5)
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.