Description
CWE: 89 SQL Injection
BadSource: URLConnection Read data from a web server with URLConnection
GoodSource: A hardcoded string
Sinks: executeBatch
GoodSink: Use prepared statement and executeBatch (properly)
BadSink : data concatenated into SQL statement used in executeBatch(), which could result in SQL Injection
Flow Variant: 71 Data flow: data passed as an Object reference argument from one method to another in different classes in the same package
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.