mirror of
https://github.com/github/codeql.git
synced 2025-12-17 17:23:36 +01:00
copy, pop, get, getitem, setdefault
Also add read steps to taint tracking.
Reading from a tainted collection can be done in two situations:
1. There is an acces path
In this case a read step (possibly from a flow summary)
gives rise to a taint step.
2. There is no access path
In this case an explicit taint step (possibly via a flow
summary) should exist.
81 lines
2.6 KiB
Python
81 lines
2.6 KiB
Python
import re
|
|
import os
|
|
import subprocess
|
|
|
|
from flask import Flask, request
|
|
app = Flask(__name__)
|
|
|
|
|
|
@app.route("/command1")
|
|
def command_injection1():
|
|
files = request.args.get('files', '')
|
|
# Don't let files be `; rm -rf /`
|
|
os.system("ls " + files) # $result=BAD
|
|
|
|
|
|
@app.route("/command2")
|
|
def command_injection2():
|
|
files = request.args.get('files', '')
|
|
# Don't let files be `; rm -rf /`
|
|
subprocess.Popen("ls " + files, shell=True) # $result=BAD
|
|
|
|
|
|
@app.route("/command3")
|
|
def first_arg_injection():
|
|
cmd = request.args.get('cmd', '')
|
|
subprocess.Popen([cmd, "param1"]) # $result=BAD
|
|
|
|
|
|
@app.route("/other_cases")
|
|
def others():
|
|
files = request.args.get('files', '')
|
|
# Don't let files be `; rm -rf /`
|
|
os.popen("ls " + files) # $result=BAD
|
|
|
|
|
|
@app.route("/multiple")
|
|
def multiple():
|
|
command = request.args.get('command', '')
|
|
# We should mark flow to both calls here, which conflicts with removing flow out of
|
|
# a sink due to use-use flow.
|
|
os.system(command) # $result=BAD
|
|
os.system(command) # $result=BAD
|
|
|
|
|
|
@app.route("/not-into-sink-impl")
|
|
def not_into_sink_impl():
|
|
"""When there is flow to a sink such as `os.popen(cmd)`, we don't want to highlight that there is also
|
|
flow through the actual `popen` function to the internal call to `subprocess.Popen` -- we would usually
|
|
see that flow since we extract the `os.py` file from the standard library.
|
|
|
|
os.popen implementation: https://github.com/python/cpython/blob/fa7ce080175f65d678a7d5756c94f82887fc9803/Lib/os.py#L974
|
|
subprocess.call implementation: https://github.com/python/cpython/blob/fa7ce080175f65d678a7d5756c94f82887fc9803/Lib/subprocess.py#L341
|
|
"""
|
|
command = request.args.get('command', '')
|
|
os.system(command) # $result=BAD
|
|
os.popen(command) # $result=BAD
|
|
subprocess.call(command) # $result=BAD
|
|
subprocess.check_call(command) # $result=BAD
|
|
subprocess.run(command) # $result=BAD
|
|
|
|
|
|
@app.route("/path-exists-not-sanitizer")
|
|
def path_exists_not_sanitizer():
|
|
"""os.path.exists is not a sanitizer
|
|
|
|
This small example is inspired by real world code. Initially, it seems like a good
|
|
sanitizer. However, if you are able to create files, you can make the
|
|
`os.path.exists` check succeed, and still be able to run commands. An example is
|
|
using the filename `not-there || echo pwned`.
|
|
"""
|
|
path = request.args.get('path', '')
|
|
if os.path.exists(path):
|
|
os.system("ls " + path) # $result=BAD
|
|
|
|
|
|
@app.route("/restricted-characters")
|
|
def restricted_characters():
|
|
path = request.args.get('path', '')
|
|
if re.match(r'^[a-zA-Z0-9_-]+$', path):
|
|
os.system("ls " + path) # $SPURIOUS: result=BAD
|