Back to the previous page
| Test Case ID | 47546 |
| Bad / Good / Mixed | Mixed |
| Author | |
| Associations | Test suite: 68 |
| Added by | SAMATE Team Staff |
| Language | C |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | |
| Submission date | 2011-04-08 |
| Description | CWE: 78 OS Command Injection BadSource: listen_socket Read data using a listen socket (server side) GoodSource: Benign input Sink: w32spawnvp BadSink : execute command with wspawnvp Flow Variant: 03 Control flow: if(5==5) and if(5!=5) |
| File(s) |
|
| Flaw |
There is 1 comment
Have any comments on this test case? Please,
.
- io.c
- std_testcase.h
- std_testcase_io.h
- CWE78_OS_Command_Injection__wchar_t_listen_socket_w32spawnvp_03.c
File Contains:
CWE-078: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') on line(s): 120
CWE-078: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') on line(s): 120

