mirror of
https://github.com/github/codeql.git
synced 2026-04-30 11:15:13 +02:00
Java SSRF query: sanitize primitives
Even 'char' isn't a realistic vector for an exploit, unless somebody is copying out a string char by char.
This commit is contained in:
@@ -199,6 +199,10 @@ private class SpringRestTemplateUrlMethods extends Method {
|
||||
/** A sanitizer for request forgery vulnerabilities. */
|
||||
abstract class RequestForgerySanitizer extends DataFlow::Node { }
|
||||
|
||||
private class PrimitiveSanitizer extends RequestForgerySanitizer {
|
||||
PrimitiveSanitizer() { this.getType() instanceof PrimitiveType }
|
||||
}
|
||||
|
||||
private class HostnameSanitizingPrefix extends CompileTimeConstantExpr {
|
||||
int offset;
|
||||
|
||||
|
||||
Reference in New Issue
Block a user