mirror of
https://github.com/github/codeql.git
synced 2026-02-02 08:12:58 +01:00
These are no longer correct, since the A1 category changed from 2017 to 2021, see https://owasp.org/Top10/#whats-changed-in-the-top-10-for-2021 Since only a very few queries had these tags, I think we're much better off having them removed.
25 lines
775 B
Plaintext
25 lines
775 B
Plaintext
/**
|
|
* @name Code injection
|
|
* @description Interpreting unsanitized user input as code allows a malicious user to perform arbitrary
|
|
* code execution.
|
|
* @kind path-problem
|
|
* @problem.severity error
|
|
* @security-severity 9.3
|
|
* @sub-severity high
|
|
* @precision high
|
|
* @id py/code-injection
|
|
* @tags security
|
|
* external/cwe/cwe-094
|
|
* external/cwe/cwe-095
|
|
* external/cwe/cwe-116
|
|
*/
|
|
|
|
import python
|
|
import semmle.python.security.dataflow.CodeInjection
|
|
import DataFlow::PathGraph
|
|
|
|
from CodeInjection::Configuration config, DataFlow::PathNode source, DataFlow::PathNode sink
|
|
where config.hasFlowPath(source, sink)
|
|
select sink.getNode(), source, sink, "$@ flows to here and is interpreted as code.",
|
|
source.getNode(), "A user-provided value"
|