SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security
Downloads:  Download this Test Case #47577

Back to the previous page... Back to the previous page

Test Case IDDeprecated47577
Bad / Good / MixedMixedMixed test case
Author
Associations
Test suite: 68  
Added bySAMATE Team Staff
LanguageC
Type of test caseSource Code
Input string
Expected Output
Instructions
Submission date2011-04-08
DescriptionCWE: 78 OS Command Injection
BadSource: listen_socket Read data using a listen socket (server side)
GoodSource: Benign input
Sinks: w32spawnvp
BadSink : execute command with wspawnvp
Flow Variant: 65 Data/control flow: data passed as an argument from one function to a function in a different source file called via a function pointer
File(s)
Flaw

There is 1 comment
Have any comments on this test case? Please, .


					
				

					
				
File Contains:
CWE-078: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') on line(s): 63