Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit add1077

Browse files
committed
Python: Move RegexInjection to new dataflow API
1 parent c6caf83 commit add1077

2 files changed

Lines changed: 18 additions & 5 deletions

File tree

python/ql/lib/semmle/python/security/dataflow/RegexInjectionQuery.qll

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* Provides a taint-tracking configuration for detecting regular expression injection
2+
* Provides a taint-tracking configuration for detecting "regular expression injection"
33
* vulnerabilities.
44
*
55
* Note, for performance reasons: only import this file if
@@ -13,9 +13,11 @@ import semmle.python.dataflow.new.TaintTracking
1313
import RegexInjectionCustomizations::RegexInjection
1414

1515
/**
16+
* DEPRECATED: Use `RegexInjectionFlow` module instead.
17+
*
1618
* A taint-tracking configuration for detecting "reflected server-side cross-site scripting" vulnerabilities.
1719
*/
18-
class Configuration extends TaintTracking::Configuration {
20+
deprecated class Configuration extends TaintTracking::Configuration {
1921
Configuration() { this = "RegexInjection" }
2022

2123
override predicate isSource(DataFlow::Node source) { source instanceof Source }
@@ -28,3 +30,14 @@ class Configuration extends TaintTracking::Configuration {
2830
guard instanceof SanitizerGuard
2931
}
3032
}
33+
34+
private module RegexInjectionConfig implements DataFlow::ConfigSig {
35+
predicate isSource(DataFlow::Node source) { source instanceof Source }
36+
37+
predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
38+
39+
predicate isBarrier(DataFlow::Node node) { node instanceof Sanitizer }
40+
}
41+
42+
/** Global taint-tracking for detecting "regular expression injection" vulnerabilities. */
43+
module RegexInjectionFlow = TaintTracking::Global<RegexInjectionConfig>;

python/ql/src/Security/CWE-730/RegexInjection.ql

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@
1616
import python
1717
private import semmle.python.Concepts
1818
import semmle.python.security.dataflow.RegexInjectionQuery
19-
import DataFlow::PathGraph
19+
import RegexInjectionFlow::PathGraph
2020

2121
from
22-
Configuration config, DataFlow::PathNode source, DataFlow::PathNode sink,
22+
RegexInjectionFlow::PathNode source, RegexInjectionFlow::PathNode sink,
2323
RegexExecution regexExecution
2424
where
25-
config.hasFlowPath(source, sink) and
25+
RegexInjectionFlow::flowPath(source, sink) and
2626
regexExecution = sink.getNode().(Sink).getRegexExecution()
2727
select sink.getNode(), source, sink,
2828
"This regular expression depends on a $@ and is executed by $@.", source.getNode(),

0 commit comments

Comments
 (0)