Files
codeql/javascript/ql/lib/semmle/javascript/security/dataflow/XpathInjectionQuery.qll
2025-01-20 11:20:27 +01:00

47 lines
1.4 KiB
Plaintext

/**
* Provides a taint-tracking configuration for reasoning about
* untrusted user input used in XPath expression.
*
* Note, for performance reasons: only import this file if
* `XpathInjection::Configuration` is needed, otherwise
* `XpathInjectionCustomizations` should be imported instead.
*/
import javascript
import semmle.javascript.security.dataflow.DOM
import XpathInjectionCustomizations::XpathInjection
/**
* A taint-tracking configuration for untrusted user input used in XPath expression.
*/
module XpathInjectionConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof Source }
predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
predicate isBarrier(DataFlow::Node node) { node instanceof Sanitizer }
predicate observeDiffInformedIncrementalMode() { any() }
}
/**
* Taint-tracking for untrusted user input used in XPath expression.
*/
module XpathInjectionFlow = TaintTracking::Global<XpathInjectionConfig>;
/**
* DEPRECATED. Use the `XpathInjectionFlow` module instead.
*/
deprecated class Configuration extends TaintTracking::Configuration {
Configuration() { this = "XpathInjection" }
override predicate isSource(DataFlow::Node source) { source instanceof Source }
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
override predicate isSanitizer(DataFlow::Node node) {
super.isSanitizer(node) or
node instanceof Sanitizer
}
}