Java SSRF query: sanitize primitives

Even 'char' isn't a realistic vector for an exploit, unless somebody is copying out a string char by char.
This commit is contained in:
Chris Smowton
2021-04-14 13:07:57 +01:00
parent 93a9f471ce
commit 3333e7d186

View File

@@ -199,6 +199,10 @@ private class SpringRestTemplateUrlMethods extends Method {
/** A sanitizer for request forgery vulnerabilities. */
abstract class RequestForgerySanitizer extends DataFlow::Node { }
private class PrimitiveSanitizer extends RequestForgerySanitizer {
PrimitiveSanitizer() { this.getType() instanceof PrimitiveType }
}
private class HostnameSanitizingPrefix extends CompileTimeConstantExpr {
int offset;