Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 60a1357

Browse files
author
Max Schaefer
committed
JavaScript: Make all taint-based security queries have @kind path-problem.
1 parent 65bcf0f commit 60a1357

30 files changed

Lines changed: 30 additions & 30 deletions

javascript/ql/src/Security/CWE-022/TaintedPath.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Uncontrolled data used in path expression
33
* @description Accessing paths influenced by users can allow an attacker to access
44
* unexpected resources.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @precision high
88
* @id js/path-injection

javascript/ql/src/Security/CWE-078/CommandInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Uncontrolled command line
33
* @description Using externally controlled strings in a command line may allow a malicious
44
* user to change the meaning of the command.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @precision high
88
* @id js/command-line-injection

javascript/ql/src/Security/CWE-079/ReflectedXss.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Reflected cross-site scripting
33
* @description Writing user input directly to an HTTP response allows for
44
* a cross-site scripting vulnerability.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @precision high
88
* @id js/reflected-xss

javascript/ql/src/Security/CWE-079/StoredXss.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Stored cross-site scripting
33
* @description Using uncontrolled stored values in HTML allows for
44
* a stored cross-site scripting vulnerability.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @precision high
88
* @id js/stored-xss

javascript/ql/src/Security/CWE-079/Xss.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Client side cross-site scripting
33
* @description Writing user input directly to the DOM allows for
44
* a cross-site scripting vulnerability.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @precision high
88
* @id js/xss

javascript/ql/src/Security/CWE-089/SqlInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Database query built from user-controlled sources
33
* @description Building a database query from user-controlled sources is vulnerable to insertion of
44
* malicious code by the user.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @precision high
88
* @id js/sql-injection

javascript/ql/src/Security/CWE-094/CodeInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Code injection
33
* @description Interpreting unsanitized user input as code allows a malicious user arbitrary
44
* code execution.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @precision high
88
* @id js/code-injection

javascript/ql/src/Security/CWE-134/TaintedFormatString.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/**
22
* @name Use of externally-controlled format string
33
* @description Using external input in format strings can lead to garbled output.
4-
* @kind problem
4+
* @kind path-problem
55
* @problem.severity warning
66
* @precision high
77
* @id js/tainted-format-string

javascript/ql/src/Security/CWE-200/FileAccessToHttp.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/**
22
* @name File data in outbound network request
33
* @description Directly sending file data in an outbound network request can indicate unauthorized information disclosure.
4-
* @kind problem
4+
* @kind path-problem
55
* @problem.severity warning
66
* @id js/file-access-to-http
77
* @tags security

javascript/ql/src/Security/CWE-209/StackTraceExposure.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* @description Propagating stack trace information to an external user can
44
* unintentionally reveal implementation details that are useful
55
* to an attacker for developing a subsequent exploit.
6-
* @kind problem
6+
* @kind path-problem
77
* @problem.severity warning
88
* @precision very-high
99
* @id js/stack-trace-exposure

0 commit comments

Comments
 (0)