/** * Find Security Bugs * Copyright (c) Philippe Arteau, All rights reserved. * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 3.0 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library. */ package com.h3xstream.findsecbugs.scala; import com.h3xstream.findbugs.test.BaseDetectorTest; import com.h3xstream.findbugs.test.EasyBugReporter; import com.h3xstream.findsecbugs.FindSecBugsGlobalConfig; import java.util.Arrays; import java.util.List; import org.testng.annotations.Test; import static org.mockito.Mockito.never; import static org.mockito.Mockito.spy; import static org.mockito.Mockito.times; import static org.mockito.Mockito.verify; public class ScalaSqlInjectionAnormDetectorTest extends BaseDetectorTest { /** * Test the API coverage for SqlInjectionDetector (loadConfiguredSinks("sql-scala-anorm.txt", "SCALA_SQL_INJECTION_ANORM);) * @throws Exception */ @Test public void detectSqlInjection() throws Exception { //FindSecBugsGlobalConfig.getInstance().setDebugPrintInstructionVisited(true); //FindSecBugsGlobalConfig.getInstance().setDebugPrintInvocationVisited(false); //FindSecBugsGlobalConfig.getInstance().setDebugTaintState(true); //Locate test code String[] files = { getClassFilePath("bytecode_samples/scala_sql_injection.jar") }; //Run the analysis EasyBugReporter reporter = spy(new SecurityReporter()); analyze(files, reporter); //Assertions for single bug methods List<String> vulnerableMethods = Arrays.asList("vulnerableAnorm1", "vulnerableAnorm3", "vulnerableAnorm5", "vulnerableAnorm7", "vulnerableAnorm9"); for (String method : vulnerableMethods) { verify(reporter).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod(method) .build() ); } // Assertions for multiple bugs methods verify(reporter, times(1)).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod("vulnerableAnorm2") .build() ); verify(reporter, times(1)).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod("vulnerableAnorm4") .build() ); verify(reporter, times(1)).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod("vulnerableAnorm6") .build() ); verify(reporter, times(1)).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod("vulnerableAnorm8") .build() ); verify(reporter, times(1)).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod("vulnerableAnorm10") .build() ); verify(reporter, times(6)).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod("vulnerableAnorm11") .build() ); //Assertions for safe calls and false positives List<String> safeMethods = Arrays.asList("variousSafeAnormSelect", "variousSafeAnormUpdate", "variousSafeAnormInsert", "variousSafeAnormBatch"); for (String method : safeMethods) { verify(reporter,never()).doReportBug( bugDefinition() .bugType("SCALA_SQL_INJECTION_ANORM") .inClass("SqlController").inMethod(method) .build() ); } } }