mirror of
https://github.com/github/codeql.git
synced 2026-04-30 19:26:02 +02:00
Python: reasoning about => detecting
Co-authored-by: yoff <lerchedahl@gmail.com>
This commit is contained in:
committed by
GitHub
parent
9ebe59d393
commit
ed0e4f8425
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* Provides a taint-tracking configuration for reasoning about code injection
|
||||
* Provides a taint-tracking configuration for detecting code injection
|
||||
* vulnerabilities.
|
||||
*/
|
||||
|
||||
@@ -10,7 +10,7 @@ import semmle.python.Concepts
|
||||
import semmle.python.dataflow.new.RemoteFlowSources
|
||||
|
||||
/**
|
||||
* A taint-tracking configuration for reasoning about code injection vulnerabilities.
|
||||
* A taint-tracking configuration for detecting code injection vulnerabilities.
|
||||
*/
|
||||
class CodeInjectionConfiguration extends TaintTracking::Configuration {
|
||||
CodeInjectionConfiguration() { this = "CodeInjectionConfiguration" }
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* Provides a taint-tracking configuration for reasoning about command injection
|
||||
* Provides a taint-tracking configuration for detecting command injection
|
||||
* vulnerabilities.
|
||||
*/
|
||||
|
||||
@@ -10,7 +10,7 @@ import semmle.python.Concepts
|
||||
import semmle.python.dataflow.new.RemoteFlowSources
|
||||
|
||||
/**
|
||||
* A taint-tracking configuration for reasoning about command injection vulnerabilities.
|
||||
* A taint-tracking configuration for detecting command injection vulnerabilities.
|
||||
*/
|
||||
class CommandInjectionConfiguration extends TaintTracking::Configuration {
|
||||
CommandInjectionConfiguration() { this = "CommandInjectionConfiguration" }
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* Provides a taint-tracking configuration for reasoning about path injection
|
||||
* Provides a taint-tracking configuration for detecting path injection
|
||||
* vulnerabilities.
|
||||
*
|
||||
* We detect cases where a user-controlled path is used in an unsafe manner,
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* Provides a taint-tracking configuration for reasoning about reflected server-side
|
||||
* Provides a taint-tracking configuration for detecting reflected server-side
|
||||
* cross-site scripting vulnerabilities.
|
||||
*/
|
||||
|
||||
@@ -10,7 +10,7 @@ import semmle.python.Concepts
|
||||
import semmle.python.dataflow.new.RemoteFlowSources
|
||||
|
||||
/**
|
||||
* A taint-tracking configuration for reasoning about reflected server-side cross-site
|
||||
* A taint-tracking configuration for detecting reflected server-side cross-site
|
||||
* scripting vulnerabilities.
|
||||
*/
|
||||
class ReflectedXssConfiguration extends TaintTracking::Configuration {
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* Provides a taint-tracking configuration for reasoning about SQL injection
|
||||
* Provides a taint-tracking configuration for detecting SQL injection
|
||||
* vulnerabilities.
|
||||
*/
|
||||
|
||||
@@ -10,7 +10,7 @@ import semmle.python.Concepts
|
||||
import semmle.python.dataflow.new.RemoteFlowSources
|
||||
|
||||
/**
|
||||
* A taint-tracking configuration for reasoning about SQL injection vulnerabilities.
|
||||
* A taint-tracking configuration for detecting SQL injection vulnerabilities.
|
||||
*/
|
||||
class SQLInjectionConfiguration extends TaintTracking::Configuration {
|
||||
SQLInjectionConfiguration() { this = "SQLInjectionConfiguration" }
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* Provides a taint-tracking configuration for reasoning about arbitrary code execution
|
||||
* Provides a taint-tracking configuration for detecting arbitrary code execution
|
||||
* vulnerabilities due to deserializing user-controlled data.
|
||||
*/
|
||||
|
||||
@@ -10,7 +10,7 @@ import semmle.python.Concepts
|
||||
import semmle.python.dataflow.new.RemoteFlowSources
|
||||
|
||||
/**
|
||||
* A taint-tracking configuration for reasoning about arbitrary code execution
|
||||
* A taint-tracking configuration for detecting arbitrary code execution
|
||||
* vulnerabilities due to deserializing user-controlled data.
|
||||
*/
|
||||
class UnsafeDeserializationConfiguration extends TaintTracking::Configuration {
|
||||
|
||||
Reference in New Issue
Block a user