| Detector: | Findbugs |
| Target: | project ' axis1 ' version1.2 |
| Tags: |
vulnerability
unsanitized input
|
Anomaly identified by the detector. Please review whether this anomaly corresponds to a misuse.
| Finding: | finding-2 |
| In File: | org/apache/axis/attachments/ManagedMemoryDataSource.java |
| In Method: | main(String[]) |
| Code with Finding: |
|
| Hit | Rank | Desc | Type | Violations |
|---|---|---|---|---|
| Yes |
2 |
SECPTO: java/io/FileOutputStream.<init>(Ljava/lang/String;)V writes to a file whose location might be specified by user input |
PATH_TRAVERSAL_OUT |
| Reviewer Name: | anna |
| : |
The variable writeFile is created with an unsanitzied input. Therefore, the function reads a file which is controlled by the user which is a vulnerability. |