mirror of
https://github.com/github/codeql.git
synced 2025-12-22 19:56:32 +01:00
Python: Rename sink definitions for XXE/XML bomb
This commit is contained in:
@@ -35,11 +35,10 @@ module XmlBomb {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A call to an XML parser that performs internal entity expansion, viewed
|
* A call to an XML parser that is vulnerable to XML bombs.
|
||||||
* as a data flow sink for XML-bomb vulnerabilities.
|
|
||||||
*/
|
*/
|
||||||
class XmlParsingWithEntityResolution extends Sink {
|
class XmlParsingVulnerableToXmlBomb extends Sink {
|
||||||
XmlParsingWithEntityResolution() {
|
XmlParsingVulnerableToXmlBomb() {
|
||||||
exists(XML::XmlParsing parsing, XML::XmlParsingVulnerabilityKind kind |
|
exists(XML::XmlParsing parsing, XML::XmlParsingVulnerabilityKind kind |
|
||||||
kind.isXmlBomb() and
|
kind.isXmlBomb() and
|
||||||
parsing.vulnerableTo(kind) and
|
parsing.vulnerableTo(kind) and
|
||||||
|
|||||||
@@ -35,11 +35,10 @@ module Xxe {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A call to an XML parser that performs external entity expansion, viewed
|
* A call to an XML parser that is vulnerable to XXE.
|
||||||
* as a data flow sink for XXE vulnerabilities.
|
|
||||||
*/
|
*/
|
||||||
class XmlParsingWithExternalEntityResolution extends Sink {
|
class XmlParsingVulnerableToXxe extends Sink {
|
||||||
XmlParsingWithExternalEntityResolution() {
|
XmlParsingVulnerableToXxe() {
|
||||||
exists(XML::XmlParsing parsing, XML::XmlParsingVulnerabilityKind kind |
|
exists(XML::XmlParsing parsing, XML::XmlParsingVulnerabilityKind kind |
|
||||||
kind.isXxe() and
|
kind.isXxe() and
|
||||||
parsing.vulnerableTo(kind) and
|
parsing.vulnerableTo(kind) and
|
||||||
|
|||||||
Reference in New Issue
Block a user