Skip to content

Commit 8d87f55

Browse files
author
Max Schaefer
committed
JavaScript: Add import DataFlow::PathGraph.
1 parent 4860364 commit 8d87f55

30 files changed

+37
-8
lines changed

javascript/ql/src/Security/CWE-022/TaintedPath.ql

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@
1616

1717
import javascript
1818
import semmle.javascript.security.dataflow.TaintedPath::TaintedPath
19+
import DataFlow::PathGraph
1920

2021
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
2122
where cfg.hasFlow(source, sink)

javascript/ql/src/Security/CWE-078/CommandInjection.ql

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@
1414

1515
import javascript
1616
import semmle.javascript.security.dataflow.CommandInjection::CommandInjection
17+
import DataFlow::PathGraph
1718

1819
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink, DataFlow::Node highlight
1920
where cfg.hasFlow(source, sink) and

javascript/ql/src/Security/CWE-079/ReflectedXss.ql

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,9 @@
1313

1414
import javascript
1515
import semmle.javascript.security.dataflow.ReflectedXss::ReflectedXss
16+
import DataFlow::PathGraph
1617

1718
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1819
where cfg.hasFlow(source, sink)
1920
select sink, "Cross-site scripting vulnerability due to $@.",
20-
source, "user-provided value"
21+
source, "user-provided value"

javascript/ql/src/Security/CWE-079/StoredXss.ql

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,9 @@
1313

1414
import javascript
1515
import semmle.javascript.security.dataflow.StoredXss::StoredXss
16+
import DataFlow::PathGraph
1617

1718
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1819
where cfg.hasFlow(source, sink)
1920
select sink, "Stored cross-site scripting vulnerability due to $@.",
20-
source, "stored value"
21+
source, "stored value"

javascript/ql/src/Security/CWE-079/Xss.ql

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@
1313

1414
import javascript
1515
import semmle.javascript.security.dataflow.DomBasedXss::DomBasedXss
16+
import DataFlow::PathGraph
1617

1718
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1819
where cfg.hasFlow(source, sink)

javascript/ql/src/Security/CWE-089/SqlInjection.ql

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@
1313
import javascript
1414
import semmle.javascript.security.dataflow.SqlInjection
1515
import semmle.javascript.security.dataflow.NosqlInjection
16+
import DataFlow::PathGraph
1617

1718
from DataFlow::Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1819
where (cfg instanceof SqlInjection::Configuration or

javascript/ql/src/Security/CWE-094/CodeInjection.ql

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,8 @@
1414

1515
import javascript
1616
import semmle.javascript.security.dataflow.CodeInjection::CodeInjection
17+
import DataFlow::PathGraph
1718

1819
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1920
where cfg.hasFlow(source, sink)
20-
select sink, "$@ flows to here and is interpreted as code.", source, "User-provided value"
21+
select sink, "$@ flows to here and is interpreted as code.", source, "User-provided value"

javascript/ql/src/Security/CWE-134/TaintedFormatString.ql

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111

1212
import javascript
1313
import semmle.javascript.security.dataflow.TaintedFormatString::TaintedFormatString
14+
import DataFlow::PathGraph
1415

1516
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1617
where cfg.hasFlow(source, sink)

javascript/ql/src/Security/CWE-200/FileAccessToHttp.ql

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010

1111
import javascript
1212
import semmle.javascript.security.dataflow.FileAccessToHttp::FileAccessToHttp
13+
import DataFlow::PathGraph
1314

1415
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1516
where cfg.hasFlow (source, sink)

javascript/ql/src/Security/CWE-209/StackTraceExposure.ql

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,9 @@
1313

1414
import javascript
1515
import semmle.javascript.security.dataflow.StackTraceExposure::StackTraceExposure
16+
import DataFlow::PathGraph
1617

1718
from Configuration cfg, DataFlow::Node source, DataFlow::Node sink
1819
where cfg.hasFlow(source, sink)
1920
select sink, "Stack trace information from $@ may be exposed to an external user here.",
20-
source, "here"
21+
source, "here"

0 commit comments

Comments
 (0)