mirror of
https://github.com/github/codeql.git
synced 2026-03-05 15:16:47 +01:00
Java: update xpath sink kind to xpath-injection
This commit is contained in:
@@ -275,10 +275,10 @@ module ModelValidation {
|
||||
not kind =
|
||||
[
|
||||
"open-url", "jndi-injection", "ldap", "sql-injection", "jdbc-url", "logging", "mvel",
|
||||
"xpath", "groovy", "xss", "ognl-injection", "intent-start", "pending-intent-sent",
|
||||
"url-redirection", "create-file", "read-file", "write-file", "set-hostname-verifier",
|
||||
"header-splitting", "information-leak", "xslt", "jexl", "bean-validation", "ssti",
|
||||
"fragment-injection", "command-injection"
|
||||
"xpath-injection", "groovy", "xss", "ognl-injection", "intent-start",
|
||||
"pending-intent-sent", "url-redirection", "create-file", "read-file", "write-file",
|
||||
"set-hostname-verifier", "header-splitting", "information-leak", "xslt", "jexl",
|
||||
"bean-validation", "ssti", "fragment-injection", "command-injection"
|
||||
] and
|
||||
not kind.matches("regex-use%") and
|
||||
not kind.matches("qltest%") and
|
||||
|
||||
@@ -13,7 +13,7 @@ abstract class XPathInjectionSink extends DataFlow::Node { }
|
||||
/** A default sink representing methods susceptible to XPath Injection attacks. */
|
||||
private class DefaultXPathInjectionSink extends XPathInjectionSink {
|
||||
DefaultXPathInjectionSink() {
|
||||
sinkNode(this, "xpath")
|
||||
sinkNode(this, "xpath-injection")
|
||||
or
|
||||
exists(ClassInstanceExpr constructor |
|
||||
constructor.getConstructedType().getASourceSupertype*().hasQualifiedName("org.dom4j", "XPath")
|
||||
|
||||
Reference in New Issue
Block a user