mirror of
https://github.com/github/codeql.git
synced 2025-12-18 09:43:15 +01:00
I've added 2 queries: - one that detects full SSRF, where an attacker can control the full URL, which is always bad - and one for partial SSRF, where an attacker can control parts of an URL (such as the path, query parameters, or fragment), which is not a big problem in many cases (but might still be exploitable) full SSRF should run by default, and partial SSRF should not (but makes it easy to see the other results). Some elements of the full SSRF queries needs a bit more polishing, like being able to detect `"https://" + user_input` is in fact controlling the full URL.
2 lines
49 B
Plaintext
2 lines
49 B
Plaintext
Security/CWE-918/FullServerSideRequestForgery.ql
|