mirror of
https://github.com/github/codeql.git
synced 2026-04-30 11:15:13 +02:00
Python: make sure unsafe deserialization query is using correct sources and that pickle is included in sinks.
This commit is contained in:
@@ -28,7 +28,7 @@ class UnsafeDeserializationConfiguration extends TaintTracking::Configuration {
|
||||
|
||||
UnsafeDeserializationConfiguration() { this = "Unsafe deserialization configuration" }
|
||||
|
||||
override predicate isSource(TaintTracking::Source source) { source.isSourceOf(any(UntrustedStringKind u)) }
|
||||
override predicate isSource(TaintTracking::Source source) { source instanceof HttpRequestTaintSource }
|
||||
|
||||
override predicate isSink(TaintTracking::Sink sink) { sink instanceof DeserializationSink }
|
||||
|
||||
|
||||
@@ -25,7 +25,7 @@ private FunctionObject pickleLoads() {
|
||||
}
|
||||
|
||||
/** `pickle.loads(untrusted)` vulnerability. */
|
||||
class UnpicklingNode extends TaintSink {
|
||||
class UnpicklingNode extends DeserializationSink {
|
||||
|
||||
override string toString() { result = "unpickling untrusted data" }
|
||||
|
||||
|
||||
Reference in New Issue
Block a user