Files
codeql/javascript/ql/lib/semmle/javascript/security/dataflow/HostHeaderPoisoningInEmailGenerationQuery.qll
2022-09-09 10:34:14 +02:00

25 lines
647 B
Plaintext

/**
* Provides a taint tracking configuration for reasoning about host header
* poisoning in email generation.
*/
import javascript
/**
* A taint tracking configuration for host header poisoning in email generation.
*/
class Configuration extends TaintTracking::Configuration {
Configuration() { this = "TaintedHostHeader" }
override predicate isSource(DataFlow::Node node) {
exists(Http::RequestHeaderAccess input | node = input |
input.getKind() = "header" and
input.getAHeaderName() = "host"
)
}
override predicate isSink(DataFlow::Node node) {
exists(EmailSender email | node = email.getABody())
}
}