/**
* Find Security Bugs
* Copyright (c) Philippe Arteau, All rights reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 3.0 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library.
*/
package com.h3xstream.findsecbugs.injection.sql;
import com.h3xstream.findbugs.test.BaseDetectorTest;
import com.h3xstream.findbugs.test.EasyBugReporter;
import org.testng.annotations.Test;
import java.util.Arrays;
import static org.mockito.Mockito.spy;
import static org.mockito.Mockito.times;
import static org.mockito.Mockito.verify;
public class SpringJdbcOperationsAndTemplateTest extends BaseDetectorTest {
@Test
public void detectBasicSpringJdbcInjection() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Assertion on the 4 basic test
for(String unsafeMethod : Arrays.asList("query1","query2","query3","query4")) {
verify(reporter).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod(unsafeMethod)
.build()
);
verify(reporter).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod(unsafeMethod)
.build()
);
}
}
@Test
public void detectExecute() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryExecute")
.build()
);
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryExecute")
.build()
);
}
@Test
public void detectBatchUpdate() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(8)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryBatchUpdate")
.build()
);
verify(reporter, times(8)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryBatchUpdate")
.build()
);
}
@Test
public void detectQueryForObject() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(8)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryForObject")
.build()
);
verify(reporter, times(8)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryForObject")
.build()
);
}
@Test
public void detectQuery() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(12)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("querySamples")
.build()
);
verify(reporter, times(12)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("querySamples")
.build()
);
}
@Test
public void detectQueryForList() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(6)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryForList")
.build()
);
verify(reporter, times(6)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryForList")
.build()
);
}
@Test
public void detectQueryForMap() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryForMap")
.build()
);
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryForMap")
.build()
);
}
@Test
public void detectQueryForRowSet() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryForRowSet")
.build()
);
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryForRowSet")
.build()
);
}
@Test
public void detectQueryInt() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryForInt")
.build()
);
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryForInt")
.build()
);
}
@Test
public void detectQueryLong() throws Exception {
//Locate test code
String[] files = {
getClassFilePath("testcode/sqli/SpringJdbcOperations"),
getClassFilePath("testcode/sqli/SpringJdbcTemplate")
};
//Run the analysis
EasyBugReporter reporter = spy(new SecurityReporter());
analyze(files, reporter);
//Exact match of the number of vulnerability rise
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcTemplate")
.inMethod("queryForLong")
.build()
);
verify(reporter, times(3)).doReportBug(
bugDefinition()
.bugType("SQL_INJECTION_SPRING_JDBC")
.inClass("SpringJdbcOperations")
.inMethod("queryForLong")
.build()
);
}
}