From a421e3a3a366f7f7d01eec6f3053a3f949ed83d3 Mon Sep 17 00:00:00 2001 From: Ahmed Farid Date: Thu, 16 Feb 2023 14:14:43 +0100 Subject: [PATCH] Update TimingAttackAgainstHeaderValue.ql --- .../TimingAttackAgainstHeaderValue.ql | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHeaderValue/TimingAttackAgainstHeaderValue.ql b/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHeaderValue/TimingAttackAgainstHeaderValue.ql index 6a41486f0e1..e88dbdcba36 100644 --- a/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHeaderValue/TimingAttackAgainstHeaderValue.ql +++ b/python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHeaderValue/TimingAttackAgainstHeaderValue.ql @@ -28,6 +28,6 @@ class ClientSuppliedSecretConfig extends TaintTracking::Configuration { } from ClientSuppliedSecretConfig config, DataFlow::PathNode source, DataFlow::PathNode sink -where config.hasFlowPath(source, sink) and not sink.getNode().(CompareSink).FlowToLen() +where config.hasFlowPath(source, sink) and not sink.getNode().(CompareSink).flowtolen() select sink.getNode(), source, sink, "Timing attack against $@ validation.", source.getNode(), "client-supplied token"