MarkStackedVulnerable.java

1
/*******************************************************************************
2
 * Copyhacked (H) 2012-2020.
3
 * This program and the accompanying materials
4
 * are made available under no term at all, use it like
5
 * you want, but share and discuss about it
6
 * every time possible with every body.
7
 * 
8
 * Contributors:
9
 *      ron190 at ymail dot com - initial implementation
10
 ******************************************************************************/
11
package com.jsql.view.scan.interaction;
12
13
import com.jsql.model.bean.util.Header;
14
import com.jsql.model.injection.strategy.AbstractStrategy;
15
import com.jsql.view.interaction.InteractionCommand;
16
import com.jsql.view.swing.util.MediatorHelper;
17
18
import java.util.Map;
19
20
/**
21
 * Mark the injection as vulnerable to a basic injection.
22
 */
23
public class MarkStackedVulnerable implements InteractionCommand {
24
25
    private final String url;
26
27
    @SuppressWarnings("unchecked")
28
    public MarkStackedVulnerable(Object[] interactionParams) {
29
30
        Map<Header, Object> params = (Map<Header, Object>) interactionParams[0];
31
        this.url = (String) params.get(Header.URL);
32
    }
33
34
    @Override
35
    public void execute() {
36
        
37
        AbstractStrategy strategy = MediatorHelper.model().getMediatorStrategy().getStacked();
38 1 1. execute : removed call to com/jsql/view/swing/manager/ManagerScan::highlight → NO_COVERAGE
        MediatorHelper.managerScan().highlight(this.url, strategy.toString());
39
    }
40
}

Mutations

38

1.1
Location : execute
Killed by : none
removed call to com/jsql/view/swing/manager/ManagerScan::highlight → NO_COVERAGE

Active mutators

Tests examined


Report generated by PIT 1.16.1