mirror of
https://github.com/github/codeql.git
synced 2025-12-24 04:36:35 +01:00
Rename from SensitiveBroadcast to SensitiveCommmunication
This commit is contained in:
@@ -1,4 +1,4 @@
|
|||||||
/** Provides definitions to reason about Android Sensitive Broadcast queries */
|
/** Provides definitions to reason about Android Sensitive Communication queries */
|
||||||
|
|
||||||
import java
|
import java
|
||||||
import semmle.code.java.dataflow.DataFlow3
|
import semmle.code.java.dataflow.DataFlow3
|
||||||
@@ -1,18 +1,17 @@
|
|||||||
/**
|
/**
|
||||||
* @name Broadcasting sensitive data to all Android applications
|
* @name Leaking sensetive information through an implicit Intent.
|
||||||
* @description An Android application uses implicit intents to broadcast
|
* @description An Android application uses implicit intents containing sensitive data
|
||||||
* sensitive data to all applications without specifying any
|
* in a way that exposes it to arbitrary applications on the device.
|
||||||
* receiver permission.
|
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/android/sensitive-broadcast
|
* @id java/android/sensitive-communication
|
||||||
* @tags security
|
* @tags security
|
||||||
* external/cwe/cwe-927
|
* external/cwe/cwe-927
|
||||||
*/
|
*/
|
||||||
|
|
||||||
import java
|
import java
|
||||||
import semmle.code.java.security.AndroidSensitiveBroadcastQuery
|
import semmle.code.java.security.AndroidSensitiveCommunicationQuery
|
||||||
import DataFlow::PathGraph
|
import DataFlow::PathGraph
|
||||||
|
|
||||||
from SensitiveBroadcastConfig cfg, DataFlow::PathNode source, DataFlow::PathNode sink
|
from SensitiveBroadcastConfig cfg, DataFlow::PathNode source, DataFlow::PathNode sink
|
||||||
Reference in New Issue
Block a user