...
Failure to sanitize user input before processing or storing it can result in injection attacks.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
IDS00-J | High | Likely | YesProbable | MediumNo | P12P18 | L1 |
Automated Detection
| Tool | Version | Checker | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| The Checker Framework |
| Tainting Checker | Trust and security errors (see Chapter 8) | ||||||||
| CodeSonar |
| JAVA.IO.INJ.SQL | SQL Injection (Java)injection | ||||||||
| Coverity | 7.5 | SQLI | Implemented | ||||||||
| Findbugs | 1.0 | SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE | Implemented | ||||||||
| Fortify | 1.0 | HTTP_Response_Splitting | Implemented | ||||||||
| Klocwork |
| SV.DATA.DB | Implemented | ||||||||
| Parasoft Jtest |
| CERT.IDS00.TDSQL | Protect against SQL injection | ||||||||
| SonarQube |
| ||||||||||
| SpotBugs |
| SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE | Implemented |
...
STR02-C. Sanitize data passed to complex subsystemsSEI CERT C++ Coding StandardVOID STR02-CPP. Sanitize data passed to complex subsystems | |
| SEI CERT Perl Coding Standard | IDS33-PL. Sanitize untrusted data passed across a trust boundary |
Injection [RST] | |
CWE-116, Improper Encoding or Escaping of Output |
...