Files
codeql/javascript/ql/src/Security/CWE-117/LogInjection.ql
2020-12-01 09:18:40 +01:00

21 lines
676 B
Plaintext

/**
* @name Log Injection
* @description Building log entries from user-controlled sources is vulnerable to
* insertion of forged log entries by a malicious user.
* @kind path-problem
* @problem.severity error
* @precision medium
* @id js/log-injection
* @tags security
* external/cwe/cwe-117
*/
import javascript
import DataFlow::PathGraph
import semmle.javascript.security.dataflow.LogInjection::LogInjection
from LogInjectionConfiguration config, DataFlow::PathNode source, DataFlow::PathNode sink
where config.hasFlowPath(source, sink)
select sink.getNode(), source, sink, "$@ flows to log entry.", source.getNode(),
"User-provided value"