Python: make sure unsafe deserialization query is using correct sources and that pickle is included in sinks.

This commit is contained in:
Mark Shannon
2019-03-06 17:33:32 +00:00
parent bc19769e6d
commit 8b01bac900
2 changed files with 2 additions and 2 deletions

View File

@@ -28,7 +28,7 @@ class UnsafeDeserializationConfiguration extends TaintTracking::Configuration {
UnsafeDeserializationConfiguration() { this = "Unsafe deserialization configuration" }
override predicate isSource(TaintTracking::Source source) { source.isSourceOf(any(UntrustedStringKind u)) }
override predicate isSource(TaintTracking::Source source) { source instanceof HttpRequestTaintSource }
override predicate isSink(TaintTracking::Sink sink) { sink instanceof DeserializationSink }

View File

@@ -25,7 +25,7 @@ private FunctionObject pickleLoads() {
}
/** `pickle.loads(untrusted)` vulnerability. */
class UnpicklingNode extends TaintSink {
class UnpicklingNode extends DeserializationSink {
override string toString() { result = "unpickling untrusted data" }