mirror of
https://github.com/github/codeql.git
synced 2026-05-07 06:31:41 +02:00
27 lines
1.0 KiB
Plaintext
27 lines
1.0 KiB
Plaintext
/** Provides a taint-tracking configuration to reason about use of externally controlled strings for command injection vulnerabilities. */
|
|
|
|
import java
|
|
private import semmle.code.java.dataflow.FlowSources
|
|
private import semmle.code.java.security.ExternalProcess
|
|
private import semmle.code.java.security.CommandArguments
|
|
|
|
/** A taint-tracking configuration to reason about use of externally controlled strings to make command line commands. */
|
|
module ExecTaintedLocalConfig implements DataFlow::ConfigSig {
|
|
predicate isSource(DataFlow::Node src) { src instanceof LocalUserInput }
|
|
|
|
predicate isSink(DataFlow::Node sink) { sink.asExpr() instanceof ArgumentToExec }
|
|
|
|
predicate isBarrier(DataFlow::Node node) {
|
|
node.getType() instanceof PrimitiveType
|
|
or
|
|
node.getType() instanceof BoxedType
|
|
or
|
|
isSafeCommandArgument(node.asExpr())
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Taint-tracking flow for use of externally controlled strings to make command line commands.
|
|
*/
|
|
module ExecTaintedLocalFlow = TaintTracking::Global<ExecTaintedLocalConfig>;
|