Skip to content

Commit 682a711

Browse files
committed
JS: Make TaintedFormatString have same severity as LogInjection
The CWE number for this query is associated with buffer overflows from printf/scanf-style functions in C++, which has likely determined its derived security score. But in JavaScript, a tainted format string is unlikely to lead to anything worse than log injection so we're manually update its score to reflect this.
1 parent 83ca4ef commit 682a711

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

javascript/ql/src/Security/CWE-134/TaintedFormatString.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* @description Using external input in format strings can lead to garbled output.
44
* @kind path-problem
55
* @problem.severity warning
6-
* @security-severity 9.3
6+
* @security-severity 7.3
77
* @precision high
88
* @id js/tainted-format-string
99
* @tags security

0 commit comments

Comments
 (0)