Description
CWE: 89 SQL Injection
BadSource: File Read data from file (named c:\data.txt)
GoodSource: A hardcoded string
Sinks: execute
GoodSink: Use prepared statement and execute (properly)
BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection
Flow Variant: 51 Data flow: data passed as an argument from one function to another in different classes in the same package
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.