National Institute of Standards and Technology
Package illustrating a test case

Test case 144743

Description

CWE: 78 OS Command Injection
BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter())
GoodSource: A hardcoded string
BadSink: exec dynamic command execution with Runtime.getRuntime().exec()
Flow Variant: 51 Data flow: data passed as an argument from one function to another in different classes in the same package

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.