You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
from DataFlow::PathNodesource, DataFlow::PathNodesink,ExecTaintConfiguration2conf,MethodAccesscall, DataFlow::NodesourceCmd, DataFlow::NodesinkCmd,ExecTaintConfigurationconfCmd
22
-
wherecall.getMethod()instanceofRuntimeExecMethod
23
-
// this is a command-accepting call to exec, e.g. rt.exec(new String[]{"/bin/sh", ...})
24
-
and(
25
-
confCmd.hasFlow(sourceCmd,sinkCmd)
26
-
andsinkCmd.asExpr()=call.getArgument(0)
27
-
)
28
-
// it is tainted by untrusted user input
29
-
and(
30
-
conf.hasFlow(source.getNode(),sink.getNode())
31
-
andsink.getNode().asExpr()=call.getArgument(0)
32
-
)
33
-
selectsink,source,sink,"Call to dangerous java.lang.Runtime.exec() with command '$@' with arg from untrusted input '$@'",
from DataFlow::Nodesource, DataFlow::Nodesink,ExecTaintConfiguration2conf,MethodAccesscall,intindex, DataFlow::NodesourceCmd, DataFlow::NodesinkCmd,ExecTaintConfigurationconfCmd
22
-
wherecall.getMethod()instanceofRuntimeExecMethod
23
-
// this is a command-accepting call to exec, e.g. exec("/bin/sh", ...)
24
-
and(
25
-
confCmd.hasFlow(sourceCmd,sinkCmd)
26
-
andsinkCmd.asExpr()=call.getArgument(0)
27
-
)
28
-
// it is tainted by untrusted user input
29
-
and(
30
-
conf.hasFlow(source,sink)
31
-
andsink.asExpr()=call.getArgument(index)
32
-
)
33
-
selectsink,"Call to dangerous java.lang.Runtime.exec() with command '$@' with arg from untrusted input '$@'",
from DataFlow::PathNodesource, DataFlow::PathNodesink,ExecTaintConfiguration2conf,MethodAccesscall, DataFlow::NodesourceCmd, DataFlow::NodesinkCmd,ExecTaintConfigurationconfCmd
22
-
wherecall.getMethod()instanceofRuntimeExecMethod
23
-
// this is a command-accepting call to exec, e.g. rt.exec(new String[]{"/bin/sh", ...})
24
-
and(
25
-
confCmd.hasFlow(sourceCmd,sinkCmd)
26
-
andsinkCmd.asExpr()=call.getArgument(0)
27
-
)
28
-
// it is tainted by untrusted user input
29
-
and(
30
-
conf.hasFlow(source.getNode(),sink.getNode())
31
-
andsink.getNode().asExpr()=call.getArgument(0)
32
-
)
33
-
selectsink,source,sink,"Call to dangerous java.lang.Runtime.exec() with command '$@' with arg from untrusted input '$@'",
0 commit comments