Description
CWE: 643 Xpath Injection
BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter())
GoodSource: A hardcoded string
Sinks:
GoodSink: validate input through StringEscapeUtils
BadSink : user input is used without validate
Flow Variant: 71 Data flow: data passed as an Object reference argument from one method to another in different classes in the same package
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.