Python: Rename to EmailXss

This commit is contained in:
Rasmus Wriedt Larsen
2023-08-28 11:10:10 +02:00
parent ed0e441567
commit 6961ca5234
5 changed files with 9 additions and 14 deletions

View File

@@ -15,10 +15,10 @@
// determine precision above
import python
import experimental.semmle.python.security.dataflow.ReflectedXSS
import ReflectedXSSFlow::PathGraph
import experimental.semmle.python.security.dataflow.EmailXss
import EmailXssFlow::PathGraph
from ReflectedXSSFlow::PathNode source, ReflectedXSSFlow::PathNode sink
where ReflectedXSSFlow::flowPath(source, sink)
from EmailXssFlow::PathNode source, EmailXssFlow::PathNode sink
where EmailXssFlow::flowPath(source, sink)
select sink.getNode(), source, sink, "Cross-site scripting vulnerability due to $@.",
source.getNode(), "a user-provided value"

View File

@@ -1,6 +1,5 @@
/**
* Provides a taint-tracking configuration for detecting reflected server-side
* cross-site scripting vulnerabilities.
* Provides a taint-tracking configuration for detecting "Email XSS" vulnerabilities.
*/
import python
@@ -12,11 +11,7 @@ import experimental.semmle.python.Concepts
import semmle.python.Concepts
import semmle.python.ApiGraphs
/**
* A taint-tracking configuration for detecting reflected server-side cross-site
* scripting vulnerabilities.
*/
private module ReflectedXSSConfig implements DataFlow::ConfigSig {
private module EmailXssConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
predicate isSink(DataFlow::Node sink) { sink = any(EmailSender email).getHtmlBody() }
@@ -41,5 +36,5 @@ private module ReflectedXSSConfig implements DataFlow::ConfigSig {
}
}
/** Global taint-tracking for detecting "TODO" vulnerabilities. */
module ReflectedXSSFlow = TaintTracking::Global<ReflectedXSSConfig>;
/** Global taint-tracking for detecting "Email XSS" vulnerabilities. */
module EmailXssFlow = TaintTracking::Global<EmailXssConfig>;