SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security
Downloads:  Download this Test Case #156395

Back to the previous page... Back to the previous page

Test Case IDCandidate156395
Bad / Good / MixedBadBad test case
AuthorIARPA STONESOUP Test and Evaluation team
Associations
Test suite: 102  
Application: 14  
Added byCharles Oliveira
LanguageJava
Type of test caseSource Code
Input string
Expected Output
Instructions
See src/BUILD.txt file for instructions on how to install.
Submission date2015-10-06
DescriptionThis test creates a connection to the MySQL database,
and creates a query string based on data in an array passed
by arguments. This data is not checked for special elements, however,
and it is possible to construct a query string that performs
unexpected data retrievals or modifications.

Metadata
- Base program: Apache Lucene
- Source Taint: ENVIRONMENT_VARIABLE
- Data Type: ARRAY
- Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE
- Control Flow: INDIRECTLY_RECURSIVE
File(s)
Flaw

There are no comments
Have any comments on this test case? Please, .

File Contains:
CWE-089: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') on line(s): 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128