You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: java/ql/src/experimental/Security/CWE/CWE-598/SensitiveGetQuery.ql
+9-9Lines changed: 9 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ import java
14
14
import semmle.code.java.dataflow.FlowSources
15
15
import semmle.code.java.dataflow.TaintTracking
16
16
import semmle.code.java.security.SensitiveActions
17
-
importDataFlow::PathGraph
17
+
importSensitiveGetQueryFlow::PathGraph
18
18
19
19
/** A variable that holds sensitive information judging by its name. */
20
20
classSensitiveInfoExprextendsExpr{
@@ -59,22 +59,22 @@ class RequestGetParamSource extends DataFlow::ExprNode {
59
59
}
60
60
61
61
/** A taint configuration tracking flow from the `ServletRequest` of a GET request handler to an expression whose name suggests it holds security-sensitive data. */
0 commit comments