Skip to content

Commit cc5ef4d

Browse files
committed
rename JsonSerializeCall to JsonStringifyCall
1 parent b43d410 commit cc5ef4d

File tree

8 files changed

+11
-11
lines changed

8 files changed

+11
-11
lines changed

javascript/ql/src/Security/CWE-116/IncompleteSanitization.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ predicate isBackslashEscape(StringReplaceCall mce, DataFlow::RegExpLiteralNode r
6767
*/
6868
predicate allBackslashesEscaped(DataFlow::Node nd) {
6969
// `JSON.stringify` escapes backslashes
70-
nd instanceof JsonSerializeCall
70+
nd instanceof JsonStringifyCall
7171
or
7272
// check whether `nd` itself escapes backslashes
7373
exists(DataFlow::RegExpLiteralNode rel | isBackslashEscape(nd, rel) |

javascript/ql/src/javascript.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ import semmle.javascript.InclusionTests
3434
import semmle.javascript.JSDoc
3535
import semmle.javascript.JSON
3636
import semmle.javascript.JsonParsers
37-
import semmle.javascript.JsonSerializers
37+
import semmle.javascript.JsonStringifiers
3838
import semmle.javascript.JSX
3939
import semmle.javascript.Lines
4040
import semmle.javascript.Locations

javascript/ql/src/semmle/javascript/JsonSerializers.qll renamed to javascript/ql/src/semmle/javascript/JsonStringifiers.qll

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
import javascript
66

77
/**
8-
* A call to a JSON serializer such as `JSON.stringify` or `require("util").inspect`.
8+
* A call to a JSON stringifier such as `JSON.stringify` or `require("util").inspect`.
99
*/
10-
class JsonSerializeCall extends DataFlow::CallNode {
11-
JsonSerializeCall() {
10+
class JsonStringifyCall extends DataFlow::CallNode {
11+
JsonStringifyCall() {
1212
exists(DataFlow::SourceNode callee | this = callee.getACall() |
1313
callee = DataFlow::globalVarRef("JSON").getAPropertyRead("stringify") or
1414
callee = DataFlow::moduleMember("json3", "stringify") or
@@ -23,7 +23,7 @@ class JsonSerializeCall extends DataFlow::CallNode {
2323
}
2424

2525
/**
26-
* Gets the data flow node holding the input object to be serialized.
26+
* Gets the data flow node holding the input object to be stringified.
2727
*/
2828
DataFlow::Node getInput() { result = getArgument(0) }
2929

javascript/ql/src/semmle/javascript/dataflow/TaintTracking.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -544,7 +544,7 @@ module TaintTracking {
544544
* A taint propagating data flow edge arising from JSON unparsing.
545545
*/
546546
private class JsonStringifyTaintStep extends AdditionalTaintStep, DataFlow::CallNode {
547-
JsonStringifyTaintStep() { this instanceof JsonSerializeCall }
547+
JsonStringifyTaintStep() { this instanceof JsonStringifyCall }
548548

549549
override predicate step(DataFlow::Node pred, DataFlow::Node succ) {
550550
pred = getArgument(0) and succ = this

javascript/ql/src/semmle/javascript/heuristics/AdditionalSources.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ private class RemoteFlowPassword extends HeuristicSource, RemoteFlowSource {
2828
*/
2929
private class JSONStringifyAsCommandInjectionSource extends HeuristicSource,
3030
CommandInjection::Source {
31-
JSONStringifyAsCommandInjectionSource() { this instanceof JsonSerializeCall }
31+
JSONStringifyAsCommandInjectionSource() { this instanceof JsonStringifyCall }
3232

3333
override string getSourceType() { result = "a string from JSON.stringify" }
3434
}

javascript/ql/src/semmle/javascript/security/dataflow/CleartextLoggingCustomizations.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ module CleartextLogging {
202202
exists(DataFlow::PropWrite write, DataFlow::PropRead read |
203203
read = write.getRhs()
204204
or
205-
exists(JsonSerializeCall stringify |
205+
exists(JsonStringifyCall stringify |
206206
stringify.getOutput() = write.getRhs() and
207207
stringify.getInput() = read
208208
)

javascript/ql/src/semmle/javascript/security/dataflow/ImproperCodeSanitizationCustomizations.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ module ImproperCodeSanitization {
3636
* A call to `JSON.stringify()` seen as a source for improper code sanitization
3737
*/
3838
class JSONStringifyAsSource extends Source {
39-
JSONStringifyAsSource() { this instanceof JsonSerializeCall }
39+
JSONStringifyAsSource() { this instanceof JsonStringifyCall }
4040
}
4141

4242
/**

javascript/ql/src/semmle/javascript/security/dataflow/PostMessageStar.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ module PostMessageStar {
4949
exists(DataFlow::InvokeNode toString | toString = trg |
5050
toString.(DataFlow::MethodCallNode).calls(src, "toString")
5151
or
52-
src = toString.(JsonSerializeCall).getInput()
52+
src = toString.(JsonStringifyCall).getInput()
5353
) and
5454
inlbl instanceof PartiallyTaintedObject and
5555
outlbl.isTaint()

0 commit comments

Comments
 (0)