mirror of
https://github.com/github/codeql.git
synced 2025-12-22 11:46:32 +01:00
42 lines
1.5 KiB
Plaintext
42 lines
1.5 KiB
Plaintext
/** Provides taint tracking configurations to be used in queries related to the Log Injection vulnerability. */
|
|
|
|
import java
|
|
import semmle.code.java.dataflow.FlowSources
|
|
import semmle.code.java.security.LogInjection
|
|
|
|
/**
|
|
* DEPRECATED: Use `LogInjectionFlow` instead.
|
|
*
|
|
* A taint-tracking configuration for tracking untrusted user input used in log entries.
|
|
*/
|
|
deprecated class LogInjectionConfiguration extends TaintTracking::Configuration {
|
|
LogInjectionConfiguration() { this = "LogInjectionConfiguration" }
|
|
|
|
override predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
|
|
|
|
override predicate isSink(DataFlow::Node sink) { sink instanceof LogInjectionSink }
|
|
|
|
override predicate isSanitizer(DataFlow::Node node) { node instanceof LogInjectionSanitizer }
|
|
|
|
override predicate isAdditionalTaintStep(DataFlow::Node node1, DataFlow::Node node2) {
|
|
any(LogInjectionAdditionalTaintStep c).step(node1, node2)
|
|
}
|
|
}
|
|
|
|
module LogInjectionConfig implements DataFlow::ConfigSig {
|
|
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
|
|
|
|
predicate isSink(DataFlow::Node sink) { sink instanceof LogInjectionSink }
|
|
|
|
predicate isBarrier(DataFlow::Node node) { node instanceof LogInjectionSanitizer }
|
|
|
|
predicate isAdditionalFlowStep(DataFlow::Node node1, DataFlow::Node node2) {
|
|
any(LogInjectionAdditionalTaintStep c).step(node1, node2)
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Taint-tracking flow for tracking untrusted user input used in log entries.
|
|
*/
|
|
module LogInjectionFlow = TaintTracking::Global<LogInjectionConfig>;
|