From 40cfbab335370d674fbf9b704381e0d88c473ce3 Mon Sep 17 00:00:00 2001 From: Esben Sparre Andreasen Date: Tue, 12 Jan 2021 08:25:16 +0100 Subject: [PATCH] JS: address review feedback --- .../IncompleteMultiCharacterSanitization.ql | 9 ++- ...ompleteMultiCharacterSanitization.expected | 66 +++++++++---------- 2 files changed, 37 insertions(+), 38 deletions(-) diff --git a/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql b/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql index cef10d3cbe7..3ae30ffe15b 100644 --- a/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql +++ b/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql @@ -89,13 +89,13 @@ predicate matchesDangerousPrefix(EmptyReplaceRegExpTerm t, string prefix, string kind = "path injection" and // upwards navigation prefix = ["/..", "../"] and - not t.getSuccessor*().getAMatchedString().regexpMatch("(?i).*[a-z0-9_-]+.*") // explicit path name mentions make this an unlikely sanitizer + not t.getSuccessor*().getAMatchedString().regexpMatch("(?is).*[a-z0-9_-].*") // explicit path name mentions make this an unlikely sanitizer or kind = "HTML element injection" and ( // comments prefix = "