Deprecated test case
Description
CWE: 643 Unsafe Treatment of XPath Input
BadSource: getQueryStringServlet Parse id param out of the querystring without getParam
GoodSource: A hardcoded string
Sinks: unvalidatedXPath
GoodSink: validate input through StringEscapeUtils
BadSink : user input is used without validate
Flow Variant: 11 Control flow: if(IO.static_returns_t()) and if(IO.static_returns_f())
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.