Skip to content

Commit 0ce27d1

Browse files
authored
Merge pull request github#12985 from asgerf/rb/meta-query-sql-injection
Ruby: add SQL injection sinks to meta query
2 parents ab67103 + f59c149 commit 0ce27d1

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

ruby/ql/src/queries/meta/internal/TaintMetrics.qll

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ private import codeql.ruby.security.PathInjectionCustomizations
88
private import codeql.ruby.security.ServerSideRequestForgeryCustomizations
99
private import codeql.ruby.security.UnsafeDeserializationCustomizations
1010
private import codeql.ruby.security.UrlRedirectCustomizations
11+
private import codeql.ruby.security.SqlInjectionCustomizations
1112

1213
class RelevantFile extends File {
1314
RelevantFile() { not getRelativePath().regexpMatch(".*/test(case)?s?/.*") }
@@ -34,6 +35,8 @@ DataFlow::Node relevantTaintSink(string kind) {
3435
kind = "UnsafeDeserialization" and result instanceof UnsafeDeserialization::Sink
3536
or
3637
kind = "UrlRedirect" and result instanceof UrlRedirect::Sink
38+
or
39+
kind = "SqlInjection" and result instanceof SqlInjection::Sink
3740
) and
3841
// the sink is not a string literal
3942
not exists(Ast::StringLiteral str |

0 commit comments

Comments
 (0)