mirror of
https://github.com/github/codeql.git
synced 2026-04-30 11:15:13 +02:00
Java: convert XXE test to .qlref
This commit is contained in:
@@ -5,7 +5,7 @@ public class SAXReaderTests {
|
||||
|
||||
public void unconfiguredReader(Socket sock) throws Exception {
|
||||
SAXReader reader = new SAXReader();
|
||||
reader.read(sock.getInputStream()); // $ hasTaintFlow
|
||||
reader.read(sock.getInputStream()); // $ Alert
|
||||
}
|
||||
|
||||
public void safeReader(Socket sock) throws Exception {
|
||||
@@ -20,21 +20,21 @@ public class SAXReaderTests {
|
||||
SAXReader reader = new SAXReader();
|
||||
reader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
|
||||
reader.setFeature("http://xml.org/sax/features/external-general-entities", false);
|
||||
reader.read(sock.getInputStream()); // $ hasTaintFlow
|
||||
reader.read(sock.getInputStream()); // $ Alert
|
||||
}
|
||||
|
||||
public void partialConfiguredReader2(Socket sock) throws Exception {
|
||||
SAXReader reader = new SAXReader();
|
||||
reader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
|
||||
reader.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
|
||||
reader.read(sock.getInputStream()); // $ hasTaintFlow
|
||||
reader.read(sock.getInputStream()); // $ Alert
|
||||
}
|
||||
|
||||
public void partialConfiguredReader3(Socket sock) throws Exception {
|
||||
SAXReader reader = new SAXReader();
|
||||
reader.setFeature("http://xml.org/sax/features/external-general-entities", false);
|
||||
reader.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
|
||||
reader.read(sock.getInputStream()); // $ hasTaintFlow
|
||||
reader.read(sock.getInputStream()); // $ Alert
|
||||
}
|
||||
|
||||
public void misConfiguredReader1(Socket sock) throws Exception {
|
||||
@@ -42,7 +42,7 @@ public class SAXReaderTests {
|
||||
reader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
|
||||
reader.setFeature("http://xml.org/sax/features/external-general-entities", true);
|
||||
reader.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
|
||||
reader.read(sock.getInputStream()); // $ hasTaintFlow
|
||||
reader.read(sock.getInputStream()); // $ Alert
|
||||
}
|
||||
|
||||
public void misConfiguredReader2(Socket sock) throws Exception {
|
||||
@@ -50,7 +50,7 @@ public class SAXReaderTests {
|
||||
reader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", false);
|
||||
reader.setFeature("http://xml.org/sax/features/external-general-entities", false);
|
||||
reader.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
|
||||
reader.read(sock.getInputStream()); // $ hasTaintFlow
|
||||
reader.read(sock.getInputStream()); // $ Alert
|
||||
}
|
||||
|
||||
public void misConfiguredReader3(Socket sock) throws Exception {
|
||||
@@ -58,6 +58,6 @@ public class SAXReaderTests {
|
||||
reader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
|
||||
reader.setFeature("http://xml.org/sax/features/external-general-entities", false);
|
||||
reader.setFeature("http://xml.org/sax/features/external-parameter-entities", true);
|
||||
reader.read(sock.getInputStream()); // $ hasTaintFlow
|
||||
reader.read(sock.getInputStream()); // $ Alert
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user