Files
codeql/docs/language/ql-training/query-examples/java/data-flow-java-2.ql
james 40be3bc8cf docs: rename ql-training-rst > ql-training
(cherry picked from commit 65573492e7)
2019-09-10 16:03:03 +01:00

8 lines
289 B
Plaintext

import java
import semmle.code.java.dataflow.DataFlow::DataFlow
from MethodAccess ma, StringConcat stringConcat
where
ma.getMethod().getName().matches("sparql%Query") and
localFlow(exprNode(stringConcat), exprNode(ma.getArgument(0)))
select ma, "SPARQL query vulnerable to injection."