Skip to content

Commit 8852f69

Browse files
Apply suggestions from code review
Co-authored-by: Anders Schack-Mulligen <[email protected]>
1 parent 3248f45 commit 8852f69

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

java/ql/src/semmle/code/java/security/GroovyInjection.qll

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/** Provides classes to reason about Groovy code injection attacks. */
22

3-
import semmle.code.java.dataflow.DataFlow
4-
import semmle.code.java.dataflow.ExternalFlow
5-
import semmle.code.java.frameworks.Networking
3+
private import semmle.code.java.dataflow.DataFlow
4+
private import semmle.code.java.dataflow.ExternalFlow
5+
private import semmle.code.java.frameworks.Networking
66

77
/** A data flow sink for Groovy expression injection vulnerabilities. */
88
abstract class GroovyInjectionSink extends DataFlow::ExprNode { }
@@ -98,7 +98,7 @@ private predicate groovyCompilationUnitTaintStep(DataFlow::Node fromNode, DataFl
9898
m.getDeclaringType() instanceof TypeGroovyCompilationUnit
9999
|
100100
fromNode.asExpr() = ma.getArgument(ma.getNumArgument() - 1) and
101-
toNode.asExpr() = ma.getQualifier()
101+
toNode.(PostUpdateNode).getPreUpdateNode().asExpr() = ma.getQualifier()
102102
)
103103
}
104104

@@ -136,7 +136,7 @@ private predicate groovySourceUnitTaintStep(DataFlow::Node fromNode, DataFlow::N
136136

137137
/**
138138
* Holds if `fromNode` to `toNode` is a dataflow step from a tainted object to
139-
* a `ReaderSource` instance by calling `new *ReaderSource(tainted, ...)`
139+
* a `ReaderSource` instance by calling `new ReaderSource(tainted, ...)`.
140140
*/
141141
private predicate groovyReaderSourceTaintStep(DataFlow::Node fromNode, DataFlow::Node toNode) {
142142
exists(ClassInstanceExpr cie | cie.getConstructedType() instanceof TypeReaderSource |

0 commit comments

Comments
 (0)