SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security
Downloads:  Download this Test Case #156296

Back to the previous page... Back to the previous page

Test Case IDCandidate156296
Bad / Good / MixedBadBad test case
AuthorIARPA STONESOUP Test and Evaluation team
Associations
Test suite: 102  
Application: 11  
Added byCharles Oliveira
LanguageJava
Type of test caseSource Code
Input string
Expected Output
Instructions
See src/build.xml and src/maven-build.xml.
Submission date2015-10-06
DescriptionUsing Hibernate to execute a dynamic SQL statement
with built-in user-controlled input can allow an attacker to
modify the statement's meaning or to execute arbitrary SQL commands.

Metadata
- Base program: Apache Jena
- Source Taint: ENVIRONMENT_VARIABLE
- Data Type: ARRAY
- Data Flow: ADDRESS_AS_CONSTANT
- Control Flow: INTERRUPT
File(s)
Flaw

There are no comments
Have any comments on this test case? Please, .

File Contains:
CWE-564: SQL Injection: Hibernate on line(s): 471, 472, 473, 474, 475, 476, 477, 478, 479, 480, 481, 482, 483, 484, 485, 486, 487, 488, 489, 490, 491, 492, 493, 494, 495, 496, 497, 498, 499, 500, 501, 502, 503, 504, 505, 506, 507, 508, 509, 510, 511, 512, 513, 514, 515, 516, 517, 518, 519, 520, 521, 522, 523

					
				

					
				

					
				

					
				

					
				

					
				

					
				

					
				

					
				

Contact: :: Created: Jan. 2006 :: Updated: Nov. 2017 :: Version: 4.9