mirror of
https://github.com/github/codeql.git
synced 2026-04-30 03:05:15 +02:00
JavaScript: Refactor security queries for uniformity.
This commit is contained in:
@@ -14,7 +14,7 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.ReflectedXss::ReflectedXss
|
||||
|
||||
from Configuration xss, DataFlow::Node source, DataFlow::Node sink
|
||||
where xss.hasFlow(source, sink)
|
||||
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
|
||||
where cfg.hasFlow(source, sink)
|
||||
select sink, "Cross-site scripting vulnerability due to $@.",
|
||||
source, "user-provided value"
|
||||
@@ -14,7 +14,7 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.StoredXss::StoredXss
|
||||
|
||||
from Configuration xss, DataFlow::Node source, DataFlow::Node sink
|
||||
where xss.hasFlow(source, sink)
|
||||
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
|
||||
where cfg.hasFlow(source, sink)
|
||||
select sink, "Stored cross-site scripting vulnerability due to $@.",
|
||||
source, "stored value"
|
||||
@@ -14,7 +14,7 @@
|
||||
import javascript
|
||||
import semmle.javascript.security.dataflow.DomBasedXss::DomBasedXss
|
||||
|
||||
from Configuration xss, DataFlow::Node source, Sink sink
|
||||
where xss.hasFlow(source, sink)
|
||||
select sink, sink.getVulnerabilityKind() + " vulnerability due to $@.",
|
||||
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
|
||||
where cfg.hasFlow(source, sink)
|
||||
select sink, sink.(Sink).getVulnerabilityKind() + " vulnerability due to $@.",
|
||||
source, "user-provided value"
|
||||
|
||||
Reference in New Issue
Block a user