50 lines
1.3 KiB
Java
50 lines
1.3 KiB
Java
/*
|
|
* Copyright (c) 2010-2015 SAP SE.
|
|
* 2016-2018 The University of Sheffield.
|
|
*
|
|
* All rights reserved. This program and the accompanying materials
|
|
* This program and the accompanying materials are made
|
|
* available under the terms of the Eclipse Public License 2.0
|
|
* which is available at https://www.eclipse.org/legal/epl-2.0/
|
|
*
|
|
* SPDX-License-Identifier: EPL-2.0
|
|
*/
|
|
|
|
package com.logicalhacking.dasca.dataflow.test.data;
|
|
|
|
import java.sql.Connection;
|
|
import java.sql.SQLException;
|
|
import java.sql.Statement;
|
|
|
|
import com.logicalhacking.dasca.dataflow.test.data.dummy.IO;
|
|
|
|
|
|
// Test Case 19:
|
|
//reachability from multiple differing bad sinks to one bad source with multiple vulnerabilities
|
|
public class Test19 {
|
|
|
|
/*
|
|
* 2 findings
|
|
*/
|
|
public void bad(int i) {
|
|
String userName = IO.readLine();
|
|
|
|
if(i < 10) {
|
|
userName = IO.readLine2();
|
|
}
|
|
|
|
Connection conn = IO.getDBConnection();
|
|
try {
|
|
Statement stmt = conn.createStatement();
|
|
stmt.execute("SELECT * FROM user WHERE name='" + userName + "';");
|
|
} catch(SQLException e) {
|
|
e.printStackTrace();
|
|
}
|
|
}
|
|
|
|
public static void main(String[] args) {
|
|
Test19 test = new Test19();
|
|
test.bad(5);
|
|
}
|
|
}
|