Files
codeql/docs/codeql/ql-training/query-examples/java/query-injection-java-3.ql
2023-10-24 10:30:26 +01:00

11 lines
279 B
Plaintext

import java
predicate isStringConcat(AddExpr ae) { ae.getType() instanceof TypeString }
from Method m, MethodCall ma
where
m.getName().matches("sparql%Query") and
ma.getMethod() = m and
isStringConcat(ma.getArgument(0))
select ma, "SPARQL query vulnerable to injection."