Skip to content

Commit c138ed3

Browse files
committed
QLDocs
1 parent 03ce8d6 commit c138ed3

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

java/ql/src/Security/CWE/CWE-749/UnsafeAndroidAccess.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ import semmle.code.java.security.UnsafeAndroidAccess
1717
import DataFlow::PathGraph
1818

1919
/**
20-
* Taint configuration tracking flow from untrusted inputs to `loadUrl` or `postUrl` calls.
20+
* Taint configuration tracking flow from untrusted inputs to a resource fetching call.
2121
*/
2222
class FetchUntrustedResourceConfiguration extends TaintTracking::Configuration {
2323
FetchUntrustedResourceConfiguration() { this = "FetchUntrustedResourceConfiguration" }

java/ql/src/semmle/code/java/security/UnsafeAndroidAccess.qll

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
/**
2+
* Provides classes to reason about Unsafe Resource Fetching vulnerabilities in Android.
23
*/
34

45
import java
@@ -7,6 +8,9 @@ import semmle.code.java.dataflow.DataFlow
78
import semmle.code.java.dataflow.ExternalFlow
89

910
/**
11+
* A sink that represents a method that fetches a web resource.
12+
*
13+
* Extend this class to add your own Unsafe Resource Fetching sinks.
1014
*/
1115
abstract class UrlResourceSink extends DataFlow::Node {
1216
/**
@@ -15,9 +19,7 @@ abstract class UrlResourceSink extends DataFlow::Node {
1519
abstract string getSinkType();
1620
}
1721

18-
/**
19-
* A URL argument to a `loadUrl` or `postUrl` call, considered as a sink.
20-
*/
22+
/** CSV sink models representing methods susceptible to Unsafe Resource Fetching attacks. */
2123
private class DefaultUrlResourceSinkModel extends SinkModelCsv {
2224
override predicate row(string row) {
2325
row =

0 commit comments

Comments
 (0)