mirror of
https://github.com/github/codeql.git
synced 2026-05-19 21:57:13 +02:00
This adds a framework model for Vercel serverless functions so that
CodeQL's existing JavaScript security queries can detect vulnerabilities
in handlers of the form
export default function handler(req: VercelRequest, res: VercelResponse) { ... }
Handlers are identified as the default export of a module whose first
two parameters are typed as `VercelRequest`/`VercelResponse` from
`@vercel/node`. The default-export constraint excludes private helpers
that share the same signature. Type-based detection follows the same
pattern already used by `NextReqResHandler` in `Next.qll`.
The framework model covers:
- Route handler recognition (default-exported typed handlers only)
- Request input sources: `query`, `body`, `cookies`, and `url`
(the last inherited from Node's `IncomingMessage`)
- Named header accesses like `req.headers.host` and `req.headers.referer`,
modelled as `Http::RequestHeaderAccess` so header-specific queries fire
- Response sinks: `res.send`, `res.status(...).send`, `res.redirect`
- Header definitions via `res.setHeader`
Includes a library test exercising each model predicate (including a
negative case for private helpers) and query consistency fixtures
demonstrating end-to-end detection for js/reflected-xss,
js/request-forgery, js/sql-injection, and js/command-line-injection.
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
10 lines
317 B
TypeScript
10 lines
317 B
TypeScript
import type { VercelRequest, VercelResponse } from "@vercel/node";
|
|
import { exec } from "child_process";
|
|
|
|
export default function handler(req: VercelRequest, res: VercelResponse) {
|
|
const name = req.query.name as string; // $ Source
|
|
exec("echo " + name, (err, stdout) => { // $ Alert
|
|
res.send(stdout);
|
|
});
|
|
}
|