mirror of
https://github.com/hohn/codeql-intro-csharp.git
synced 2025-12-16 10:43:05 +01:00
SQL Injection Code Sample Run
This commit is contained in:
committed by
=Michael Hohn
parent
75ed1f7b00
commit
a2466b0a2d
22
SqlInjection-source.ql
Normal file
22
SqlInjection-source.ql
Normal file
@@ -0,0 +1,22 @@
|
||||
/**
|
||||
* @name SQLI Vulnerability
|
||||
* @description Using untrusted strings in a sql query allows sql injection attacks.
|
||||
* @kind problem
|
||||
* @id workshop/sqlivulnerable
|
||||
* @problem.severity warning
|
||||
*/
|
||||
|
||||
import csharp
|
||||
|
||||
/*
|
||||
* 1. Identify the /source/ part of the
|
||||
* : Console.ReadLine()?.Trim() ?? string.Empty;
|
||||
* : read(STDIN_FILENO, buf, BUFSIZE - 1);
|
||||
* expression, the =Console.ReadLine()= call.
|
||||
*/
|
||||
|
||||
from MethodCall call
|
||||
where
|
||||
call.getTarget().getDeclaringType().hasFullyQualifiedName("System", "Console") and
|
||||
call.getTarget().getName() = "ReadLine"
|
||||
select call, "Source identified: " + call.toString()
|
||||
Reference in New Issue
Block a user