File tree Expand file tree Collapse file tree 1 file changed +5
-7
lines changed
ruby/ql/src/queries/security/cwe-598 Expand file tree Collapse file tree 1 file changed +5
-7
lines changed Original file line number Diff line number Diff line change 22 * @name Sensitive data read from GET request
33 * @description Placing sensitive data in a GET request increases the risk of
44 * the data being exposed to an attacker.
5- * @kind path- problem
5+ * @kind problem
66 * @problem.severity warning
77 * @security-severity 6.5
88 * @precision high
1212 */
1313
1414import ruby
15- import DataFlow:: PathGraph
1615import codeql.ruby.security.SensitiveGetQueryQuery
1716import codeql.ruby.security.SensitiveActions
1817
19- from DataFlow:: PathNode source , DataFlow:: PathNode sink , SensitiveGetQuery:: Configuration config
20- where config .hasFlowPath ( source , sink )
21- select source .getNode ( ) , source , sink ,
22- "$@ for GET requests uses query parameter as sensitive data." ,
23- source .getNode ( ) .( SensitiveGetQuery:: Source ) .getHandler ( ) , "Route handler"
18+ from DataFlow:: Node source , DataFlow:: Node sink , SensitiveGetQuery:: Configuration config
19+ where config .hasFlow ( source , sink )
20+ select source , "$@ for GET requests uses query parameter as sensitive data." ,
21+ source .( SensitiveGetQuery:: Source ) .getHandler ( ) , "Route handler"
You can’t perform that action at this time.
0 commit comments