/** * @name Code injection * @description Interpreting unsanitized user input as code allows a malicious user to perform arbitrary * code execution. * @kind path-problem * @problem.severity error * @security-severity 9.3 * @sub-severity high * @precision high * @id py/code-injection * @tags security * external/cwe/cwe-094 * external/cwe/cwe-095 * external/cwe/cwe-116 */ import python import semmle.python.security.dataflow.CodeInjectionQuery import DataFlow::PathGraph from Configuration config, DataFlow::PathNode source, DataFlow::PathNode sink where config.hasFlowPath(source, sink) select sink.getNode(), source, sink, "This code execution depends on a $@.", source.getNode(), "user-provided value"