mirror of
https://github.com/github/codeql.git
synced 2026-05-05 21:55:19 +02:00
QL tests for Python queries and libraries.
This commit is contained in:
@@ -0,0 +1 @@
|
||||
| ../lib/flask/__init__.py:16:25:16:26 | flask.response.argument | Cross-site scripting vulnerability due to $@. | reflected_xss.py:7:18:7:29 | flask.request.args | user-provided value |
|
||||
@@ -0,0 +1 @@
|
||||
Security/CWE-079/ReflectedXss.ql
|
||||
1
python/ql/test/query-tests/Security/CWE-079/options
Normal file
1
python/ql/test/query-tests/Security/CWE-079/options
Normal file
@@ -0,0 +1 @@
|
||||
semmle-extractor-options: -p ../lib/ --max-import-depth=3
|
||||
18
python/ql/test/query-tests/Security/CWE-079/reflected_xss.py
Normal file
18
python/ql/test/query-tests/Security/CWE-079/reflected_xss.py
Normal file
@@ -0,0 +1,18 @@
|
||||
from flask import Flask, request, make_response, escape
|
||||
|
||||
app = Flask(__name__)
|
||||
|
||||
@app.route('/unsafe')
|
||||
def unsafe():
|
||||
first_name = request.args.get('name', '')
|
||||
return make_response("Your name is " + first_name)
|
||||
|
||||
@app.route('/safe')
|
||||
def safe():
|
||||
first_name = request.args.get('name', '')
|
||||
return make_response("Your name is " + escape(first_name))
|
||||
|
||||
urlpatterns = [
|
||||
url(r'^r1$', response_unsafe, name='response-unsafe'),
|
||||
url(r'^r2$', response_safe, name='response-safe')
|
||||
]
|
||||
Reference in New Issue
Block a user