SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security
Downloads:  Download this Test Case #156203

Back to the previous page... Back to the previous page

Test Case IDCandidate156203
Bad / Good / MixedBadBad test case
AuthorIARPA STONESOUP Test and Evaluation team
Associations
Test suite: 102  
Application: 11  
Added byCharles Oliveira
LanguageJava
Type of test caseSource Code
Input string
Expected Output
Instructions
See src/build.xml and src/maven-build.xml.
Submission date2015-10-06
DescriptionThis test creates a connection to the PGSQL database,
and creates a query string based on data in an environment
variable. This data is not checked for special elements, however, and
it is possible to construct a query string that performs unexpected
data retrievals or modifications.

Metadata
- Base program: Apache Jena
- Source Taint: ENVIRONMENT_VARIABLE
- Data Type: VOID_POINTER
- Data Flow: BASIC
- Control Flow: INTERRUPT
File(s)
Flaw

There are no comments
Have any comments on this test case? Please, .

File Contains:
CWE-089: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') on line(s): 415, 416, 417, 418, 419, 420, 421, 422, 423, 424, 425, 426, 427, 428, 429, 430, 431, 432, 433, 434, 435, 436, 437, 438