mirror of
https://github.com/github/codeql.git
synced 2025-12-24 04:36:35 +01:00
JS: Update names, IDs, and tags for ML-powered queries
This commit is contained in:
@@ -1,15 +1,15 @@
|
||||
/**
|
||||
* For internal use only.
|
||||
*
|
||||
* @name NoSQL database query built from user-controlled sources (boosted)
|
||||
* @name NoSQL database query built from user-controlled sources (experimental)
|
||||
* @description Building a database query from user-controlled sources is vulnerable to insertion of
|
||||
* malicious code by the user.
|
||||
* @kind path-problem
|
||||
* @scored
|
||||
* @problem.severity error
|
||||
* @security-severity 8.8
|
||||
* @id adaptive-threat-modeling/js/nosql-injection
|
||||
* @tags experimental experimental/atm security
|
||||
* @id js/ml-powered/nosql-injection
|
||||
* @tags experimental security
|
||||
*/
|
||||
|
||||
import ATM::ResultsInfo
|
||||
|
||||
@@ -1,15 +1,15 @@
|
||||
/**
|
||||
* For internal use only.
|
||||
*
|
||||
* @name SQL database query built from user-controlled sources (boosted)
|
||||
* @name SQL database query built from user-controlled sources (experimental)
|
||||
* @description Building a database query from user-controlled sources is vulnerable to insertion of
|
||||
* malicious code by the user.
|
||||
* @kind path-problem
|
||||
* @scored
|
||||
* @problem.severity error
|
||||
* @security-severity 8.8
|
||||
* @id adaptive-threat-modeling/js/sql-injection
|
||||
* @tags experimental experimental/atm security
|
||||
* @id js/ml-powered/sql-injection
|
||||
* @tags experimental security
|
||||
*/
|
||||
|
||||
import experimental.adaptivethreatmodeling.SqlInjectionATM
|
||||
|
||||
@@ -1,15 +1,15 @@
|
||||
/**
|
||||
* For internal use only.
|
||||
*
|
||||
* @name Uncontrolled data used in path expression (boosted)
|
||||
* @name Uncontrolled data used in path expression (experimental)
|
||||
* @description Accessing paths influenced by users can allow an attacker to access
|
||||
* unexpected resources.
|
||||
* @kind path-problem
|
||||
* @scored
|
||||
* @problem.severity error
|
||||
* @security-severity 7.5
|
||||
* @id adaptive-threat-modeling/js/path-injection
|
||||
* @tags experimental experimental/atm security
|
||||
* @id js/ml-powered/path-injection
|
||||
* @tags experimental security
|
||||
*/
|
||||
|
||||
import ATM::ResultsInfo
|
||||
|
||||
@@ -1,15 +1,15 @@
|
||||
/**
|
||||
* For internal use only.
|
||||
*
|
||||
* @name Client-side cross-site scripting (boosted)
|
||||
* @name Client-side cross-site scripting (experimental)
|
||||
* @description Writing user input directly to the DOM allows for
|
||||
* a cross-site scripting vulnerability.
|
||||
* @kind path-problem
|
||||
* @scored
|
||||
* @problem.severity error
|
||||
* @security-severity 6.1
|
||||
* @id adaptive-threat-modeling/js/xss
|
||||
* @tags experimental experimental/atm security
|
||||
* @id js/ml-powered/xss
|
||||
* @tags experimental security
|
||||
*/
|
||||
|
||||
import javascript
|
||||
|
||||
Reference in New Issue
Block a user