File tree Expand file tree Collapse file tree 1 file changed +2
-3
lines changed
ruby/ql/lib/codeql/ruby/security Expand file tree Collapse file tree 1 file changed +2
-3
lines changed Original file line number Diff line number Diff line change @@ -234,7 +234,7 @@ module UnsafeDeserialization {
234
234
* The first argument in a call to `Oj.object_load`, always considered as a
235
235
* sink for unsafe deserialization. (global and local mode options are ignored)
236
236
*/
237
- class OjObjectLoadArgument extends Sink {
237
+ private class OjObjectLoadArgument extends Sink {
238
238
OjObjectLoadArgument ( ) {
239
239
this = API:: getTopLevelMember ( "Oj" ) .getAMethodCall ( "object_load" ) .getArgument ( 0 )
240
240
}
@@ -266,8 +266,7 @@ module UnsafeDeserialization {
266
266
* Gets the value being assigned to `Ox.default_options`.
267
267
*/
268
268
DataFlow:: Node getValue ( ) {
269
- result .asExpr ( ) =
270
- this .getArgument ( 0 ) .asExpr ( ) .( CfgNodes:: ExprNodes:: AssignExprCfgNode ) .getRhs ( )
269
+ result = this .getArgument ( 0 )
271
270
}
272
271
}
273
272
You can’t perform that action at this time.
0 commit comments