Skip to content

Commit 8767d2d

Browse files
atorralbamchammer01
andcommitted
Don't capitalize the term content provider
Co-authored-by: mc <[email protected]>
1 parent 596cfd3 commit 8767d2d

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

java/ql/src/Security/CWE/CWE-266/IntentUriPermissionManipulation.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
<p>When an Android component expects a result from an Activity, <code>startActivityForResult</code> can be used.
77
The started Activity can then use <code>setResult</code> to return the appropriate data to the calling component.</p>
88
<p>If an Activity obtains the incoming, user-provided Intent and directly returns it via <code>setResult</code>
9-
without any checks, the application may be unintentionally giving arbitrary access to its Content Providers, even
9+
without any checks, the application may be unintentionally giving arbitrary access to its content providers, even
1010
if they are not exported, as long as they are configured with the attribute <code>android:grantUriPermissions="true"</code>.
1111
This happens because the attacker adds the appropriate URI permission flags to the provided Intent, which take effect
1212
once the Intent is reflected back.</p>

java/ql/src/Security/CWE/CWE-266/IntentUriPermissionManipulation.ql

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/**
22
* @name Intent URI permission manipulation
3-
* @description Returning an externally provided Intent via setResult may allow a malicious
4-
* application to access arbitrary Content Providers of the vulnerable application.
3+
* @description Returning an externally provided Intent via 'setResult' may allow a malicious
4+
* application to access arbitrary content providers of the vulnerable application.
55
* @kind path-problem
66
* @problem.severity error
77
* @security-severity 7.8
@@ -21,4 +21,4 @@ from DataFlow::PathNode source, DataFlow::PathNode sink
2121
where any(IntentUriPermissionManipulationConf c).hasFlowPath(source, sink)
2222
select sink.getNode(), source, sink,
2323
"This Intent can be set with arbitrary flags from $@, " +
24-
"and used to give access to internal Content Providers.", source.getNode(), "this user input"
24+
"and used to give access to internal content providers.", source.getNode(), "this user input"

java/ql/src/change-notes/2021-10-27-android-intent-uri-permission-manipulation-query.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,4 +3,4 @@ category: newQuery
33
---
44
* A new query "Intent URI permission manipulation" (`java/android/intent-uri-permission-manipulation`) has been added.
55
This query finds Android components that return unmodified, received Intents to the calling applications, which
6-
can provide unintended access to internal Content Providers of the victim application.
6+
can provide unintended access to internal content providers of the victim application.

java/ql/test/library-tests/frameworks/android/content-provider/Safe.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
import android.os.ParcelFileDescriptor;
1212
import android.os.RemoteException;
1313

14-
// This Content Provider isn't exported, so there shouldn't be any flow
14+
// This content provider isn't exported, so there shouldn't be any flow
1515
public class Safe extends ContentProvider {
1616

1717
void sink(Object o) {}

0 commit comments

Comments
 (0)