Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit a0951f7

Browse files
committed
add additional taint steps when type-tracking RemoteFlowSource
1 parent b6b8387 commit a0951f7

3 files changed

Lines changed: 17 additions & 4 deletions

File tree

javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.ql

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,17 +20,22 @@ private import semmle.javascript.security.dataflow.CodeInjectionCustomizations
2020
/**
2121
* Gets a type-tracked instance of `RemoteFlowSource` using type-tracker `t`.
2222
*/
23-
private DataFlow::SourceNode remoteFlow(DataFlow::TypeTracker t) {
23+
private DataFlow::Node remoteFlow(DataFlow::TypeTracker t) {
2424
t.start() and
2525
result instanceof RemoteFlowSource
2626
or
27-
exists(DataFlow::TypeTracker t2 | result = remoteFlow(t2).track(t2, t))
27+
exists(DataFlow::TypeTracker t2, DataFlow::Node prev | prev = remoteFlow(t2) |
28+
t2 = t.smallstep(prev, result)
29+
or
30+
any(TaintTracking::AdditionalTaintStep dts).step(prev, result) and
31+
t = t2
32+
)
2833
}
2934

3035
/**
3136
* Gets a type-tracked reference to a `RemoteFlowSource`.
3237
*/
33-
private DataFlow::SourceNode remoteFlow() { result = remoteFlow(DataFlow::TypeTracker::end()) }
38+
private DataFlow::Node remoteFlow() { result = remoteFlow(DataFlow::TypeTracker::end()) }
3439

3540
/**
3641
* Gets a type-back-tracked instance of a code-injection sink using type-tracker `t`.
@@ -60,7 +65,7 @@ where
6065
// Basic detection of duplicate results with `js/code-injection`.
6166
not (
6267
sink.getNode().(StringOps::ConcatenationLeaf).getRoot() = endsInCodeInjectionSink() and
63-
remoteFlow().flowsTo(source.getNode().(DataFlow::InvokeNode).getAnArgument())
68+
remoteFlow() = source.getNode().(DataFlow::InvokeNode).getAnArgument()
6469
)
6570
select sink.getNode(), source, sink, "$@ flows to here and is used to construct code.",
6671
source.getNode(), "Improperly sanitized value"

javascript/ql/test/query-tests/Security/CWE-094/CodeInjection/ImproperCodeSanitization.expected

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,9 @@ nodes
3131
| bad-code-sanitization.js:54:29:54:63 | JSON.st ... bble")) |
3232
| bad-code-sanitization.js:54:29:54:63 | JSON.st ... bble")) |
3333
| bad-code-sanitization.js:54:29:54:63 | JSON.st ... bble")) |
34+
| bad-code-sanitization.js:58:29:58:49 | JSON.st ... (taint) |
35+
| bad-code-sanitization.js:58:29:58:49 | JSON.st ... (taint) |
36+
| bad-code-sanitization.js:58:29:58:49 | JSON.st ... (taint) |
3437
edges
3538
| bad-code-sanitization.js:2:12:2:90 | /^[_$a- ... key)}]` | bad-code-sanitization.js:7:31:7:43 | safeProp(key) |
3639
| bad-code-sanitization.js:2:65:2:90 | `[${JSO ... key)}]` | bad-code-sanitization.js:2:12:2:90 | /^[_$a- ... key)}]` |
@@ -49,6 +52,7 @@ edges
4952
| bad-code-sanitization.js:44:22:44:42 | JSON.st ... (input) | bad-code-sanitization.js:44:22:44:42 | JSON.st ... (input) |
5053
| bad-code-sanitization.js:52:28:52:62 | JSON.st ... bble")) | bad-code-sanitization.js:52:28:52:62 | JSON.st ... bble")) |
5154
| bad-code-sanitization.js:54:29:54:63 | JSON.st ... bble")) | bad-code-sanitization.js:54:29:54:63 | JSON.st ... bble")) |
55+
| bad-code-sanitization.js:58:29:58:49 | JSON.st ... (taint) | bad-code-sanitization.js:58:29:58:49 | JSON.st ... (taint) |
5256
#select
5357
| bad-code-sanitization.js:8:27:8:46 | statements.join(';') | bad-code-sanitization.js:2:69:2:87 | JSON.stringify(key) | bad-code-sanitization.js:8:27:8:46 | statements.join(';') | $@ flows to here and is used to construct code. | bad-code-sanitization.js:2:69:2:87 | JSON.stringify(key) | Improperly sanitized value |
5458
| bad-code-sanitization.js:15:44:15:63 | htmlescape(pathname) | bad-code-sanitization.js:15:44:15:63 | htmlescape(pathname) | bad-code-sanitization.js:15:44:15:63 | htmlescape(pathname) | $@ flows to here and is used to construct code. | bad-code-sanitization.js:15:44:15:63 | htmlescape(pathname) | Improperly sanitized value |

javascript/ql/test/query-tests/Security/CWE-094/CodeInjection/bad-code-sanitization.js

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,8 @@ app.get('/some/path', function(req, res) {
5252
var foo = `(function(){${JSON.stringify(req.param("wobble"))}))` // NOT - the source is remote-flow, but we know of no sink.
5353

5454
setTimeout(`(function(){${JSON.stringify(req.param("wobble"))}))`); // OK - the source is remote-flow, and the sink is code-injection.
55+
56+
var taint = [req.body.name, "foo"].join("\n");
57+
58+
setTimeout(`(function(){${JSON.stringify(taint)}))`); // OK - the source is remote-flow, and the sink is code-injection.
5559
});

0 commit comments

Comments
 (0)