Files
codeql/docs/language/ql-training/query-examples/java/data-flow-java-2.ql
2019-09-05 08:40:36 +01:00

8 lines
289 B
Plaintext

import java
import semmle.code.java.dataflow.DataFlow::DataFlow
from MethodAccess ma, StringConcat stringConcat
where
ma.getMethod().getName().matches("sparql%Query") and
localFlow(exprNode(stringConcat), exprNode(ma.getArgument(0)))
select ma, "SPARQL query vulnerable to injection."