Skip to content

Commit c303328

Browse files
committed
Reorder and rename
1 parent 03f375e commit c303328

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

python/ql/lib/semmle/python/Concepts.qll

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1452,15 +1452,15 @@ module Http {
14521452
abstract string getMiddlewareName();
14531453

14541454
/**
1455-
* Gets the boolean value corresponding to if CORS credentials is enabled
1456-
* (`true`) or disabled (`false`) by this node.
1455+
* Gets the strings corresponding to the origins allowed by the cors policy
14571456
*/
1458-
abstract DataFlow::Node getCredentialsAllowed();
1457+
abstract DataFlow::Node getOrigins();
14591458

14601459
/**
1461-
* Gets the strings corresponding to the origins allowed by the cors policy
1460+
* Gets the boolean value corresponding to if CORS credentials is enabled
1461+
* (`true`) or disabled (`false`) by this node.
14621462
*/
1463-
abstract DataFlow::Node getOrigins();
1463+
abstract DataFlow::Node getCredentialsAllowed();
14641464
}
14651465
}
14661466

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
---
22
category: newQuery
33
---
4-
* The `py/insecure-cors-setting` query, which finds insecure CORS middleware configurations.
4+
* The `py/cors-misconfiguration-with-credentials` query, which finds insecure CORS middleware configurations.

python/ql/src/experimental/Security/CWE-942/CorsMisconfigurationMiddleware.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name SOP protection weak with credentials
2+
* @name Cors misconfiguration with credentials
33
* @description Disabling or weakening SOP protection may make the application
44
* vulnerable to a CORS attack.
55
* @kind problem

0 commit comments

Comments
 (0)