|
7 | 7 | * @problem.severity error
|
8 | 8 | * @security-severity 6.1
|
9 | 9 | * @precision high
|
10 |
| - * @id java/netty-http-response-splitting |
| 10 | + * @id java/netty-http-request-or-response-splitting |
11 | 11 | * @tags security
|
12 | 12 | * external/cwe/cwe-113
|
13 | 13 | */
|
14 | 14 |
|
15 | 15 | import java
|
| 16 | +import semmle.code.java.dataflow.FlowSources |
16 | 17 |
|
17 |
| -abstract private class InsecureNettyObjectCreation extends ClassInstanceExpr { } |
| 18 | +abstract private class InsecureNettyObjectCreation extends ClassInstanceExpr { |
| 19 | + int vulnerableArgumentIndex; |
18 | 20 |
|
19 |
| -private class InsecureDefaultHttpHeadersClassInstantiation extends InsecureNettyObjectCreation { |
| 21 | + InsecureNettyObjectCreation() { |
| 22 | + DataFlow::localExprFlow(any(CompileTimeConstantExpr ctce | ctce.getBooleanValue() = false), this.getArgument(vulnerableArgumentIndex)) |
| 23 | + } |
| 24 | + |
| 25 | + abstract string splittingType(); |
| 26 | +} |
| 27 | + |
| 28 | +abstract private class RequestOrResponseSplittingInsecureNettyObjectCreation extends InsecureNettyObjectCreation { |
| 29 | + override string splittingType() { result = "Request-splitting or response-splitting" } |
| 30 | +} |
| 31 | + |
| 32 | +/** |
| 33 | + * Request splitting can allowing an attacker to inject/smuggle an additional HTTP request into the socket connection. |
| 34 | + */ |
| 35 | +abstract private class RequestSplittingInsecureNettyObjectCreation extends InsecureNettyObjectCreation { |
| 36 | + override string splittingType() { result = "Request-splitting" } |
| 37 | +} |
| 38 | + |
| 39 | +/** |
| 40 | + * Response splitting can lead to HTTP vulnerabilities like XSS and cache poisoning. |
| 41 | + */ |
| 42 | +abstract private class ResponseSplittingInsecureNettyObjectCreation extends InsecureNettyObjectCreation { |
| 43 | + override string splittingType() { result = "Response-splitting" } |
| 44 | +} |
| 45 | + |
| 46 | +private class InsecureDefaultHttpHeadersClassInstantiation extends RequestOrResponseSplittingInsecureNettyObjectCreation { |
20 | 47 | InsecureDefaultHttpHeadersClassInstantiation() {
|
21 |
| - getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultHttpHeaders") and |
22 |
| - getArgument(0).(CompileTimeConstantExpr).getBooleanValue() = false |
| 48 | + getConstructedType() |
| 49 | + .hasQualifiedName("io.netty.handler.codec.http", |
| 50 | + ["DefaultHttpHeaders", "CombinedHttpHeaders"]) and |
| 51 | + vulnerableArgumentIndex = 0 |
23 | 52 | }
|
24 | 53 | }
|
25 | 54 |
|
26 |
| -private class InsecureDefaultHttpResponseClassInstantiation extends InsecureNettyObjectCreation { |
| 55 | +private class InsecureDefaultHttpResponseClassInstantiation extends ResponseSplittingInsecureNettyObjectCreation { |
27 | 56 | InsecureDefaultHttpResponseClassInstantiation() {
|
28 | 57 | getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultHttpResponse") and
|
29 |
| - getArgument(2).(CompileTimeConstantExpr).getBooleanValue() = false |
| 58 | + vulnerableArgumentIndex = 2 |
| 59 | + } |
| 60 | +} |
| 61 | + |
| 62 | +private class InsecureDefaultHttpRequestClassInstantiation extends RequestSplittingInsecureNettyObjectCreation { |
| 63 | + InsecureDefaultHttpRequestClassInstantiation() { |
| 64 | + getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultHttpRequest") and |
| 65 | + vulnerableArgumentIndex = 3 |
30 | 66 | }
|
31 | 67 | }
|
32 | 68 |
|
33 |
| -private class InsecureDefaultFullHttpResponseClassInstantiation extends InsecureNettyObjectCreation { |
| 69 | +private class InsecureDefaultFullHttpResponseClassInstantiation extends ResponseSplittingInsecureNettyObjectCreation { |
34 | 70 | InsecureDefaultFullHttpResponseClassInstantiation() {
|
35 | 71 | getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultFullHttpResponse") and
|
36 |
| - getArgument(3).(CompileTimeConstantExpr).getBooleanValue() = false |
| 72 | + vulnerableArgumentIndex = [2, 3] |
| 73 | + } |
| 74 | +} |
| 75 | + |
| 76 | +private class InsecureDefaultFullHttpRequestClassInstantiation extends RequestSplittingInsecureNettyObjectCreation { |
| 77 | + InsecureDefaultFullHttpRequestClassInstantiation() { |
| 78 | + getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultFullHttpRequest") and |
| 79 | + vulnerableArgumentIndex = [3, 4] |
37 | 80 | }
|
38 | 81 | }
|
39 | 82 |
|
40 | 83 | from InsecureNettyObjectCreation new
|
41 |
| -select new, "Response-splitting vulnerability due to header value verification being disabled." |
| 84 | +select new, new.splittingType() + " vulnerability due to header value verification being disabled." |
0 commit comments