|
12 | 12 | */ |
13 | 13 |
|
14 | 14 | import cpp |
15 | | -import semmle.code.cpp.security.BufferWrite |
16 | | -import semmle.code.cpp.security.TaintTracking |
| 15 | +import semmle.code.cpp.security.BufferWrite as BufferWrite |
17 | 16 | import semmle.code.cpp.security.SensitiveExprs |
18 | | -import TaintedWithPath |
| 17 | +import semmle.code.cpp.security.FlowSources |
| 18 | +import semmle.code.cpp.ir.dataflow.TaintTracking |
| 19 | +import DataFlow::PathGraph |
19 | 20 |
|
20 | | -class Configuration extends TaintTrackingConfiguration { |
21 | | - override predicate isSink(Element tainted) { exists(BufferWrite w | w.getASource() = tainted) } |
| 21 | +/** |
| 22 | + * Taint flow from user input to a buffer write. |
| 23 | + */ |
| 24 | +class ToBufferConfiguration extends TaintTracking::Configuration { |
| 25 | + ToBufferConfiguration() { this = "ToBufferConfiguration" } |
| 26 | + |
| 27 | + override predicate isSource(DataFlow::Node source) { source instanceof FlowSource } |
| 28 | + |
| 29 | + override predicate isSink(DataFlow::Node sink) { |
| 30 | + exists(BufferWrite::BufferWrite w | w.getASource() = sink.asExpr()) |
| 31 | + } |
22 | 32 | } |
23 | 33 |
|
24 | 34 | from |
25 | | - BufferWrite w, Expr taintedArg, Expr taintSource, PathNode sourceNode, PathNode sinkNode, |
26 | | - string taintCause, SensitiveExpr dest |
| 35 | + ToBufferConfiguration config, BufferWrite::BufferWrite w, DataFlow::PathNode sourceNode, |
| 36 | + DataFlow::PathNode sinkNode, FlowSource source, SensitiveExpr dest |
27 | 37 | where |
28 | | - taintedWithPath(taintSource, taintedArg, sourceNode, sinkNode) and |
29 | | - isUserInput(taintSource, taintCause) and |
30 | | - w.getASource() = taintedArg and |
| 38 | + config.hasFlowPath(sourceNode, sinkNode) and |
| 39 | + sourceNode.getNode() = source and |
| 40 | + w.getASource() = sinkNode.getNode().asExpr() and |
31 | 41 | dest = w.getDest() |
32 | 42 | select w, sourceNode, sinkNode, |
33 | | - "This write into buffer '" + dest.toString() + "' may contain unencrypted data from $@", |
34 | | - taintSource, "user input (" + taintCause + ")" |
| 43 | + "This write into buffer '" + dest.toString() + "' may contain unencrypted data from $@", source, |
| 44 | + "user input (" + source.getSourceType() + ")" |
0 commit comments