Skip to content

Commit 158a75e

Browse files
Import UnsafeDeserializationQuery in unsafeDeserialization.ql
1 parent 47e4cf4 commit 158a75e

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

java/ql/src/semmle/code/java/security/UnsafeDeserializationQuery.qll

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,10 @@ private class SafeKryo extends DataFlow2::Configuration {
121121
}
122122
}
123123

124-
private predicate unsafeDeserialization(MethodAccess ma, Expr sink) {
124+
/**
125+
* Holds if `ma` is a call that triggers deserialization with tainted data from `sink`.
126+
*/
127+
predicate unsafeDeserialization(MethodAccess ma, Expr sink) {
125128
exists(Method m | m = ma.getMethod() |
126129
m instanceof ObjectInputStreamReadObjectMethod and
127130
sink = ma.getQualifier() and

java/ql/test/library-tests/UnsafeDeserialization/unsafeDeserialization.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
import default
2-
import semmle.code.java.security.UnsafeDeserialization
2+
import semmle.code.java.security.UnsafeDeserializationQuery
33

44
from Method m, MethodAccess ma
55
where ma.getMethod() = m and unsafeDeserialization(ma, _)

0 commit comments

Comments
 (0)