Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit d4e4e2d

Browse files
committed
Python: Move TarSlip to new dataflow API
1 parent e970329 commit d4e4e2d

2 files changed

Lines changed: 19 additions & 6 deletions

File tree

python/ql/lib/semmle/python/security/dataflow/TarSlipQuery.qll

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* Provides a taint-tracking configuration for detecting "command injection" vulnerabilities.
2+
* Provides a taint-tracking configuration for detecting "tar slip" vulnerabilities.
33
*
44
* Note, for performance reasons: only import this file if
55
* `TarSlip::Configuration` is needed, otherwise
@@ -12,9 +12,11 @@ import semmle.python.dataflow.new.TaintTracking
1212
import TarSlipCustomizations::TarSlip
1313

1414
/**
15-
* A taint-tracking configuration for detecting "command injection" vulnerabilities.
15+
* DEPRECATED: Use `TarSlipFlow` module instead.
16+
*
17+
* A taint-tracking configuration for detecting "tar slip" vulnerabilities.
1618
*/
17-
class Configuration extends TaintTracking::Configuration {
19+
deprecated class Configuration extends TaintTracking::Configuration {
1820
Configuration() { this = "TarSlip" }
1921

2022
override predicate isSource(DataFlow::Node source) { source instanceof Source }
@@ -23,3 +25,14 @@ class Configuration extends TaintTracking::Configuration {
2325

2426
override predicate isSanitizer(DataFlow::Node node) { node instanceof Sanitizer }
2527
}
28+
29+
private module TarSlipConfig implements DataFlow::ConfigSig {
30+
predicate isSource(DataFlow::Node source) { source instanceof Source }
31+
32+
predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
33+
34+
predicate isBarrier(DataFlow::Node node) { node instanceof Sanitizer }
35+
}
36+
37+
/** Global taint-tracking for detecting "tar slip" vulnerabilities. */
38+
module TarSlipFlow = TaintTracking::Global<TarSlipConfig>;

python/ql/src/Security/CWE-022/TarSlip.ql

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@
1414

1515
import python
1616
import semmle.python.security.dataflow.TarSlipQuery
17-
import DataFlow::PathGraph
17+
import TarSlipFlow::PathGraph
1818

19-
from Configuration config, DataFlow::PathNode source, DataFlow::PathNode sink
20-
where config.hasFlowPath(source, sink)
19+
from TarSlipFlow::PathNode source, TarSlipFlow::PathNode sink
20+
where TarSlipFlow::flowPath(source, sink)
2121
select sink.getNode(), source, sink, "This file extraction depends on a $@.", source.getNode(),
2222
"potentially untrusted source"

0 commit comments

Comments
 (0)