mirror of
https://github.com/github/codeql.git
synced 2025-12-24 04:36:35 +01:00
rename query to overly-large-range, and rewrite the @description
This commit is contained in:
@@ -1,17 +1,18 @@
|
||||
/**
|
||||
* @name Suspicious regexp range
|
||||
* @description Some ranges in regular expression might match more than intended.
|
||||
* @name Overly large regular expression range
|
||||
* @description Overly permissive regular expression ranges may cause regular expressions to match more than anticipated.
|
||||
* This may allow an attacker to bypass a filter or sanitizer.
|
||||
* @kind problem
|
||||
* @problem.severity warning
|
||||
* @security-severity 5.0
|
||||
* @precision high
|
||||
* @id java/suspicious-regexp-range
|
||||
* @id java/overly-large-range
|
||||
* @tags correctness
|
||||
* security
|
||||
* external/cwe/cwe-020
|
||||
*/
|
||||
|
||||
import semmle.code.java.security.SuspiciousRegexpRangeQuery
|
||||
import semmle.code.java.security.OverlyLargeRangeQuery
|
||||
|
||||
RegExpCharacterClass potentialMisparsedCharClass() {
|
||||
// nested char classes are currently misparsed
|
||||
Reference in New Issue
Block a user