mirror of
https://github.com/hohn/codeql-lab.git
synced 2025-12-16 01:53:03 +01:00
wip: set up codeql-sqlite/ sample
This commit is contained in:
committed by
=Michael Hohn
parent
0e06b153cc
commit
e2e555c44c
@@ -252,7 +252,6 @@
|
||||
| 14 | "return {}" | code-injection |
|
||||
|
||||
* Identify usage of injection-related models in existing queries
|
||||
|
||||
To verify whether existing CodeQL queries make use of the injection-related
|
||||
models, we can search for files in the =ql/java= and =ql/cpp= directories that
|
||||
contain the string =-injection=. This string often appears in taint-tracking
|
||||
@@ -290,7 +289,6 @@
|
||||
These files include both top-level queries (under =src/Security/...=) and reusable model libraries (under =lib/semmle/...=). Experimental and framework-specific queries are also included.
|
||||
|
||||
** C++ Queries
|
||||
|
||||
Likewise, to check for C++ queries that reference =-injection=, use:
|
||||
|
||||
#+BEGIN_SRC sh
|
||||
@@ -309,6 +307,7 @@
|
||||
These files indicate active use of injection-related taint tracking in the C++ suite as well.
|
||||
|
||||
* TODO for java, the sqltainted query will find the sink, not the source yet.
|
||||
[[../ql/java/ql/src/Security/CWE/CWE-089/SqlTainted.ql]]
|
||||
* TODO vulnerable sample, jedis
|
||||
Running the model editor a jedis db models jedis dependencies; we need jedis
|
||||
/as/ dependency to model it.
|
||||
|
||||
Reference in New Issue
Block a user