Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 2d0a4c3

Browse files
committed
update {go/py}/stack-trace-exposure to match javascript
1 parent 5a0183f commit 2d0a4c3

2 files changed

Lines changed: 6 additions & 4 deletions

File tree

go/ql/src/Security/CWE-209/StackTraceExposure.ql

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,5 +76,6 @@ class StackTraceExposureConfig extends TaintTracking::Configuration {
7676

7777
from StackTraceExposureConfig cfg, DataFlow::PathNode source, DataFlow::PathNode sink
7878
where cfg.hasFlowPath(source, sink)
79-
select source.getNode(), source, sink, "This stack trace is exposed to a remote user $@.",
80-
sink.getNode(), "here"
79+
select sink.getNode(), source, sink,
80+
"Stack trace information from $@ may be exposed to an external user here.", source.getNode(),
81+
"here"

python/ql/src/Security/CWE-209/StackTraceExposure.ql

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,6 @@ import DataFlow::PathGraph
1919

2020
from Configuration config, DataFlow::PathNode source, DataFlow::PathNode sink
2121
where config.hasFlowPath(source, sink)
22-
select sink.getNode(), source, sink, "$@ may be exposed to an external user", source.getNode(),
23-
"Error information"
22+
select sink.getNode(), source, sink,
23+
"Stack trace information from $@ may be exposed to an external user here.", source.getNode(),
24+
"here"

0 commit comments

Comments
 (0)