/** * @name Client side cross-site scripting * @description Writing user input directly to the DOM allows for * a cross-site scripting vulnerability. * @kind path-problem * @problem.severity error * @precision high * @id js/xss * @tags security * external/cwe/cwe-079 * external/cwe/cwe-116 */ import javascript import semmle.javascript.security.dataflow.DomBasedXss::DomBasedXss import DataFlow::PathGraph from Configuration cfg, DataFlow::Node source, DataFlow::Node sink where cfg.hasFlow(source, sink) select sink, sink.(Sink).getVulnerabilityKind() + " vulnerability due to $@.", source, "user-provided value"