Description
CWE: 89 SQL Injection
BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter())
GoodSource: A hardcoded string
Sinks: executeUpdate
GoodSink: Use prepared statement and executeUpdate (properly)
BadSink : data concatenated into SQL statement used in executeUpdate(), which could result in SQL Injection
Flow Variant: 52 Data flow: data passed as an argument from one method to another to another in three different classes in the same package
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.