Merge pull request #6170 from smowton/smowton/admin/cleanup-exec-tainted-query

Change ID and description of cloned query
This commit is contained in:
Chris Smowton
2021-06-28 13:22:34 +01:00
committed by GitHub

View File

@@ -1,11 +1,11 @@
/**
* @name Uncontrolled command line
* @name Uncontrolled command line (experimental sinks)
* @description Using externally controlled strings in a command line is vulnerable to malicious
* changes in the strings.
* changes in the strings (includes experimental sinks).
* @kind path-problem
* @problem.severity error
* @precision high
* @id java/command-line-injection
* @id java/command-line-injection-experimental
* @tags security
* external/cwe/cwe-078
* external/cwe/cwe-088
@@ -18,6 +18,7 @@ import ExecCommon
import JSchOSInjection
import DataFlow::PathGraph
// This is a clone of query `java/command-line-injection` that also includes experimental sinks.
from DataFlow::PathNode source, DataFlow::PathNode sink, ArgumentToExec execArg
where execTainted(source, sink, execArg)
select execArg, source, sink, "$@ flows to here and is used in a command.", source.getNode(),