...
Failure to sanitize user input before processing or storing it can result in injection attacks.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
IDS00-J | High | Likely | Yes | NoMedium | P18 | L1 |
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| The Checker Framework |
| Tainting Checker | Trust and security errors (see Chapter 8) | ||||||
| CodeSonar |
| JAVA.IO.INJ.SQL | SQL injection | ||||||
| Coverity | 7.5 | SQLI | Implemented | ||||||
| Findbugs | 1.0 | SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE | Implemented | ||||||
| Fortify | 1.0 | HTTP_Response_Splitting | Implemented | ||||||
| Klocwork |
| SV.DATA.DB | Implemented | ||||||
| Parasoft Jtest |
| CERT.IDS00.TDSQL | Protect against SQL injection | ||||||
| SonarQube |
| ||||||||
| SpotBugs |
| SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE | Implemented |
...