Skip to content

Commit 0eb0c23

Browse files
committed
stash
1 parent bafe357 commit 0eb0c23

File tree

2 files changed

+4
-3
lines changed

2 files changed

+4
-3
lines changed

javascript/ql/lib/semmle/javascript/security/dataflow/SqlInjectionQuery.qll

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99

1010
import javascript
1111
import SqlInjectionCustomizations::SqlInjection
12+
import semmle.javascript.frameworks.TypeORM
1213

1314
/**
1415
* A taint-tracking configuration for reasoning about string based query injection vulnerabilities.
@@ -18,7 +19,7 @@ class Configuration extends TaintTracking::Configuration {
1819

1920
override predicate isSource(DataFlow::Node source) { source instanceof Source }
2021

21-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
22+
override predicate isSink(DataFlow::Node sink) { sink instanceof TypeOrm::QueryString }
2223

2324
override predicate isSanitizer(DataFlow::Node node) {
2425
super.isSanitizer(node) or

javascript/ql/src/Security/CWE-089/SqlInjection.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ from DataFlow::Configuration cfg, DataFlow::PathNode source, DataFlow::PathNode
2222
where
2323
(
2424
cfg instanceof SqlInjection::Configuration and type = "string"
25-
or
26-
cfg instanceof NosqlInjection::Configuration and type = "object"
25+
// or
26+
// cfg instanceof NosqlInjection::Configuration and type = "object"
2727
) and
2828
cfg.hasFlowPath(source, sink)
2929
select sink.getNode(), source, sink, "This query " + type + " depends on a $@.", source.getNode(),

0 commit comments

Comments
 (0)