JavaScript: Refactor security queries for uniformity.

This commit is contained in:
Max Schaefer
2018-11-08 12:41:44 +00:00
parent 9b4ae9e4d3
commit 65bcf0f526
23 changed files with 56 additions and 62 deletions

View File

@@ -14,7 +14,7 @@
import javascript
import semmle.javascript.security.dataflow.ReflectedXss::ReflectedXss
from Configuration xss, DataFlow::Node source, DataFlow::Node sink
where xss.hasFlow(source, sink)
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
where cfg.hasFlow(source, sink)
select sink, "Cross-site scripting vulnerability due to $@.",
source, "user-provided value"

View File

@@ -14,7 +14,7 @@
import javascript
import semmle.javascript.security.dataflow.StoredXss::StoredXss
from Configuration xss, DataFlow::Node source, DataFlow::Node sink
where xss.hasFlow(source, sink)
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
where cfg.hasFlow(source, sink)
select sink, "Stored cross-site scripting vulnerability due to $@.",
source, "stored value"

View File

@@ -14,7 +14,7 @@
import javascript
import semmle.javascript.security.dataflow.DomBasedXss::DomBasedXss
from Configuration xss, DataFlow::Node source, Sink sink
where xss.hasFlow(source, sink)
select sink, sink.getVulnerabilityKind() + " vulnerability due to $@.",
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
where cfg.hasFlow(source, sink)
select sink, sink.(Sink).getVulnerabilityKind() + " vulnerability due to $@.",
source, "user-provided value"