National Institute of Standards and Technology
Package illustrating a test case

Test case 147641

Description

CWE: 89 SQL Injection
BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter())
GoodSource: A hardcoded string
Sinks: executeUpdate
GoodSink: Use prepared statement and executeUpdate (properly)
BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection
Flow Variant: 42 Data flow: data returned from one method to another in the same class

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.