File tree Expand file tree Collapse file tree 1 file changed +5
-7
lines changed
ruby/ql/src/queries/security/cwe-598 Expand file tree Collapse file tree 1 file changed +5
-7
lines changed Original file line number Diff line number Diff line change 2
2
* @name Sensitive data read from GET request
3
3
* @description Placing sensitive data in a GET request increases the risk of
4
4
* the data being exposed to an attacker.
5
- * @kind path- problem
5
+ * @kind problem
6
6
* @problem.severity warning
7
7
* @security-severity 6.5
8
8
* @precision high
12
12
*/
13
13
14
14
import ruby
15
- import DataFlow:: PathGraph
16
15
import codeql.ruby.security.SensitiveGetQueryQuery
17
16
import codeql.ruby.security.SensitiveActions
18
17
19
- from DataFlow:: PathNode source , DataFlow:: PathNode sink , SensitiveGetQuery:: Configuration config
20
- where config .hasFlowPath ( source , sink )
21
- select source .getNode ( ) , source , sink ,
22
- "$@ for GET requests uses query parameter as sensitive data." ,
23
- source .getNode ( ) .( SensitiveGetQuery:: Source ) .getHandler ( ) , "Route handler"
18
+ from DataFlow:: Node source , DataFlow:: Node sink , SensitiveGetQuery:: Configuration config
19
+ where config .hasFlow ( source , sink )
20
+ select source , "$@ for GET requests uses query parameter as sensitive data." ,
21
+ source .( SensitiveGetQuery:: Source ) .getHandler ( ) , "Route handler"
You can’t perform that action at this time.
0 commit comments