National Institute of Standards and Technology
Package illustrating a test case

Test case 147685

Description

CWE: 89 SQL Injection
BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter())
GoodSource: A hardcoded string
Sinks: execute
GoodSink: Use prepared statement and execute (properly)
BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection
Flow Variant: 66 Data flow: data passed in an array from one method to another in different source files in the same package

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.