mirror of
https://github.com/github/codeql.git
synced 2026-03-01 05:13:41 +01:00
Import UnsafeDeserializationQuery in unsafeDeserialization.ql
This commit is contained in:
@@ -121,7 +121,10 @@ private class SafeKryo extends DataFlow2::Configuration {
|
||||
}
|
||||
}
|
||||
|
||||
private predicate unsafeDeserialization(MethodAccess ma, Expr sink) {
|
||||
/**
|
||||
* Holds if `ma` is a call that triggers deserialization with tainted data from `sink`.
|
||||
*/
|
||||
predicate unsafeDeserialization(MethodAccess ma, Expr sink) {
|
||||
exists(Method m | m = ma.getMethod() |
|
||||
m instanceof ObjectInputStreamReadObjectMethod and
|
||||
sink = ma.getQualifier() and
|
||||
|
||||
Reference in New Issue
Block a user