National Institute of Standards and Technology
Package illustrating a test case

Test case 156504

Description

Using Hibernate to execute a dynamic SQL statement
with built-in user-controlled input can allow an attacker to
modify the statement's meaning or to execute arbitrary SQL commands.
Metadata
- Base program: Apache Lenya
- Source Taint: ENVIRONMENT_VARIABLE
- Data Type: VOID_POINTER
- Data Flow: JAVA_GENERICS
- Control Flow: INFINITE_LOOP

Flaws

Test Suites

Have any comments on this test case? Please, send us an email.