Files
codeql/javascript/ql/src/Security/CWE-400/RemotePropertyInjection.ql
2023-10-13 13:15:05 +02:00

23 lines
806 B
Plaintext

/**
* @name Remote property injection
* @description Allowing writes to arbitrary properties of an object may lead to
* denial-of-service attacks.
* @kind path-problem
* @problem.severity warning
* @security-severity 7.5
* @precision medium
* @id js/remote-property-injection
* @tags security
* external/cwe/cwe-250
* external/cwe/cwe-400
*/
import javascript
import semmle.javascript.security.dataflow.RemotePropertyInjectionQuery
import RemotePropertyInjectionFlow::PathGraph
from RemotePropertyInjectionFlow::PathNode source, RemotePropertyInjectionFlow::PathNode sink
where RemotePropertyInjectionFlow::flowPath(source, sink)
select sink.getNode(), source, sink, sink.getNode().(Sink).getMessage() + " depends on a $@.",
source.getNode(), "user-provided value"