Thanks to visit codestin.com Credit goes to github.com
We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent c77a921 commit 832a4f2Copy full SHA for 832a4f2
1 file changed
java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.ql
@@ -29,5 +29,12 @@ private class InsecureDefaultHttpResponseClassInstantiation extends InsecureNett
29
}
30
31
32
+private class InsecureDefaultFullHttpResponseClassInstantiation extends InsecureNettyObjectCreation {
33
+ InsecureDefaultHttpResponseClassInstantiation() {
34
+ getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultFullHttpResponse") and
35
+ getArgument(3).(CompileTimeConstantExpr).getBooleanValue() = false
36
+ }
37
+}
38
+
39
from InsecureNettyObjectCreation new
40
select new, "Response-splitting vulnerability due to header value verification being disabled."
0 commit comments