Files
codeql/javascript/ql/lib/semmle/javascript/security/dataflow/HostHeaderPoisoningInEmailGenerationQuery.qll
Andrew Eisenberg 45d1fa7f01 Packaging: Rafactor Javascript core libraries
Extract the external facing `qll` files into the codeql/javascript-all
query pack.
2021-08-25 12:15:56 -07:00

25 lines
647 B
Plaintext

/**
* Provides a taint tracking configuration for reasoning about host header
* poisoning in email generation.
*/
import javascript
/**
* A taint tracking configuration for host header poisoning in email generation.
*/
class Configuration extends TaintTracking::Configuration {
Configuration() { this = "TaintedHostHeader" }
override predicate isSource(DataFlow::Node node) {
exists(HTTP::RequestHeaderAccess input | node = input |
input.getKind() = "header" and
input.getAHeaderName() = "host"
)
}
override predicate isSink(DataFlow::Node node) {
exists(EmailSender email | node = email.getABody())
}
}