/** * @name Uncontrolled data used in path expression * @description Accessing paths influenced by users can allow an attacker to access * unexpected resources. * @kind path-problem * @problem.severity error * @security-severity 7.5 * @precision high * @id go/path-injection * @tags security * external/cwe/cwe-022 * external/cwe/cwe-023 * external/cwe/cwe-036 * external/cwe/cwe-073 * external/cwe/cwe-099 */ import go import semmle.go.security.TaintedPath import TaintedPath::Flow::PathGraph from TaintedPath::Flow::PathNode source, TaintedPath::Flow::PathNode sink where TaintedPath::Flow::flowPath(source, sink) select sink.getNode(), source, sink, "This path depends on a $@.", source.getNode(), "user-provided value"