Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 7965459

Browse files
authored
Apply suggestions from code review
1 parent c4112e6 commit 7965459

2 files changed

Lines changed: 12 additions & 9 deletions

File tree

java/ql/src/Security/CWE/CWE-200/TempDirLocalInformationDisclosure.ql

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,8 @@ private class FilesVulnerableCreationMethodAccess extends MethodAccess {
7272
* We can safely assume that any calls to these methods with explicit `PosixFilePermissions.asFileAttribute`
7373
* contains a certain level of intentionality behind it.
7474
*/
75-
private class FilesSanitiznignCreationMethodAccess extends MethodAccess {
76-
FilesSanitiznignCreationMethodAccess() {
75+
private class FilesSanitizingCreationMethodAccess extends MethodAccess {
76+
FilesSanitizingCreationMethodAccess() {
7777
exists(Method m |
7878
m = this.getMethod() and
7979
m.getDeclaringType().hasQualifiedName("java.nio.file", "Files")
@@ -116,15 +116,18 @@ private class TempDirSystemGetPropertyToCreateConfig extends TaintTracking::Conf
116116
override predicate isSink(DataFlow::Node sink) { sink instanceof FileCreationSink }
117117

118118
override predicate isSanitizer(DataFlow::Node sanitizer) {
119-
exists(FilesSanitiznignCreationMethodAccess sanitisingMethodAccess |
119+
exists(FilesSanitizingCreationMethodAccess sanitisingMethodAccess |
120120
sanitizer.asExpr() = sanitisingMethodAccess.getArgument(0)
121121
)
122122
}
123123
}
124124

125-
// Below this, configuration for tracking single-method calls that are vulnerable.
125+
//
126+
// Begin configuration for tracking single-method calls that are vulnerable.
127+
//
128+
126129
/**
127-
* A MethodAccess against a method that creates a temporary file or directory in a shared temporary directory.
130+
* A `MethodAccess` against a method that creates a temporary file or directory in a shared temporary directory.
128131
*/
129132
abstract class MethodAccessInsecureFileCreation extends MethodAccess {
130133
/**
@@ -174,15 +177,15 @@ class MethodAccessInsecureGuavaFilesCreateTempFile extends MethodAccessInsecureF
174177

175178
/**
176179
* This is a hack: we include use of inherently insecure methods, which don't have any associated
177-
* flow path, in with results describing a path from reading java.io.tmpdir or similar to use
180+
* flow path, in with results describing a path from reading `java.io.tmpdir` or similar to use
178181
* in a file creation op.
179182
*
180183
* We achieve this by making inherently-insecure method invocations both a source and a sink in
181184
* this configuration, resulting in a zero-length path which is type-compatible with the actual
182185
* path-flow results.
183186
*/
184187
class InsecureMethodPseudoConfiguration extends DataFlow::Configuration {
185-
InsecureMethodPseudoConfiguration() { this = "InsecureMethodPseudoConfiguration " }
188+
InsecureMethodPseudoConfiguration() { this = "InsecureMethodPseudoConfiguration" }
186189

187190
override predicate isSource(DataFlow::Node node) {
188191
node.asExpr() instanceof MethodAccessInsecureFileCreation
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
category: newQuery
33
---
4-
* Two new querys both titled "Temporary directory Local information disclosure" (`java/local-temp-file-or-directory-information-disclosure-path`, `java/local-temp-file-or-directory-information-disclosure-method`) have been added.
5-
These queries find uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
4+
* A new query titled "Temporary directory Local information disclosure" (`java/local-temp-file-or-directory-information-disclosure`) has been added.
5+
This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory.
66
This query was originally [submitted as query by @JLLeitschuh](https://github.com/github/codeql/pull/4388).

0 commit comments

Comments
 (0)