mirror of
https://github.com/hohn/codeql-intro-csharp.git
synced 2025-12-15 18:23:04 +01:00
35 lines
965 B
Plaintext
35 lines
965 B
Plaintext
/**
|
|
* @name SQLI Vulnerability
|
|
* @description Using untrusted strings in a sql query allows sql injection attacks.
|
|
* @kind path-problem
|
|
* @id workshop/sqlivulnerable
|
|
* @problem.severity warning
|
|
*/
|
|
|
|
import csharp
|
|
|
|
module MyFlowConfiguration implements DataFlow::ConfigSig {
|
|
predicate isSource(DataFlow::Node source) {
|
|
exists(MethodCall call |
|
|
call.getTarget().getDeclaringType().hasFullyQualifiedName("System", "Console") and
|
|
call.getTarget().getName() = "ReadLine" and
|
|
source.asExpr() = call
|
|
)
|
|
}
|
|
|
|
predicate isSink(DataFlow::Node sink) {
|
|
exists(ObjectCreation oc, Expr queryArg |
|
|
oc.getObjectType().getName() = "SqliteCommand" and
|
|
oc.getArgument(0) = queryArg and
|
|
sink.asExpr() = queryArg
|
|
)
|
|
}
|
|
}
|
|
|
|
module Flow = DataFlow::Global<MyFlowConfiguration>;
|
|
import Flow::PathGraph
|
|
|
|
from Flow::PathNode source, Flow::PathNode sink
|
|
where Flow::flowPath(source, sink)
|
|
select sink, source, sink, "Dataflow found"
|