National Institute of Standards and Technology
Package illustrating a test case

Test case 156025

Description

Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands.

Metadata
-Base program: Coffee MUD
- Source Taint: ENVIRONMENT_VARIABLE
- Data Type: void_pointer
- Data Flow: address_as_function_return_value
- Control Flow: recursive

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.