Description
Using Hibernate to execute a dynamic SQL statement
with built-in user-controlled input can allow an attacker to
modify the statement's meaning or to execute arbitrary SQL commands.
Metadata
- Base program: Apache POI
- Source Taint: FILE_CONTENTS
- Data Type: VOID_POINTER
- Data Flow: INDEX_ALIAS_1
- Control Flow: BREAK_WITH_LABEL
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.