beautify names

This commit is contained in:
Nati Pesaresi
2021-09-17 17:40:56 -03:00
parent 210d0f3d6a
commit 2a20fe4b0e
4 changed files with 7 additions and 7 deletions

View File

@@ -9,13 +9,13 @@
*/
import go
import SSRF.SSRF
import SSRF
import DataFlow::PathGraph
from
SSRF::Configuration cfg, DataFlow::PathNode source,
ServerSideRequestForgery::Configuration cfg, DataFlow::PathNode source,
DataFlow::PathNode sink, DataFlow::Node request
where
cfg.hasFlowPath(source, sink) and
request = sink.getNode().(SSRF::Sink).getARequest()
request = sink.getNode().(ServerSideRequestForgery::Sink).getARequest()
select request, source, sink, "The URL of this request depends on a user-provided value"

View File

@@ -9,9 +9,9 @@ import go
* Provides a taint-tracking configuration for reasoning about request forgery
* (SSRF) vulnerabilities.
*/
module SSRF {
module ServerSideRequestForgery {
import semmle.go.frameworks.Gin
import SSRF.validator
import validator
import semmle.go.security.UrlConcatenation
import semmle.go.dataflow.barrierguardutil.RegexpCheck
import semmle.go.dataflow.Properties

View File

@@ -5,7 +5,7 @@ import (
"github.com/go-playground/validator"
)
func handler(w http.ResponseWriter, req *http.Request) {
func goodHandler(w http.ResponseWriter, req *http.Request) {
validate := validator.New()
target := req.FormValue("target")
if validate.Var(target, "alphanum")

View File

@@ -1 +1 @@
SSRF/SSRF.ql
CWE-918/SSRF.ql