Description
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands.
Metadata
-Base program: Apache Lucene
- Source Taint: SOCKET
- Data Type: array
- Data Flow: address_as_function_return_value
- Control Flow: indirectly_recursive
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.