Skip to content

Commit 6ee5865

Browse files
committed
add sources to detect CVE completely
1 parent bcfc28a commit 6ee5865

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

python/ql/src/experimental/Security/CWE-409/DecompressionBombs.ql

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
/**
2-
* @name User-controlled file decompression
3-
* @description User-controlled data that flows into decompression library APIs without checking the compression rate is dangerous
2+
* @name Uncontrolled file decompression
3+
* @description Uncontrolled data that flows into decompression library APIs without checking the compression rate is dangerous
44
* @kind path-problem
55
* @problem.severity error
66
* @security-severity 7.8
77
* @precision high
8-
* @id py/user-controlled-file-decompression
8+
* @id py/uncontrolled-file-decompression
99
* @tags security
1010
* experimental
1111
* external/cwe/cwe-409
@@ -530,5 +530,4 @@ import Bombs::PathGraph
530530

531531
from Bombs::PathNode source, Bombs::PathNode sink
532532
where Bombs::flowPath(source, sink)
533-
select sink.getNode(), source, sink, "This file extraction depends on a $@.", source.getNode(),
534-
"potentially untrusted source"
533+
select sink.getNode(), source, sink, "This file extraction is $@.", source.getNode(), "uncontrolled"

0 commit comments

Comments
 (0)