Description
CWE: 89 SQL Injection
BadSource: getQueryString_Servlet Parse id param out of the URL query string (without using getParameter())
GoodSource: A hardcoded string
Sinks: execute
GoodSink: Use prepared statement and execute (properly)
BadSink : data concatenated into SQL statement used in execute(), which could result in SQL Injection
Flow Variant: 68 Data flow: data passed as a member variable in the a class, which is used by a method in another class in the same package
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.