Files
codeql/javascript/ql/test/query-tests/Security/CWE-022/TaintedPath/examples/TaintedPath.js
2023-11-21 10:07:11 +00:00

12 lines
367 B
JavaScript

const fs = require('fs'),
http = require('http'),
url = require('url');
const ROOT = "/var/www/";
var server = http.createServer(function(req, res) {
let filePath = url.parse(req.url, true).query.path;
// BAD: This function uses unsanitized input that can read any file on the file system.
res.write(fs.readFileSync(ROOT + filePath, 'utf8'));
});