File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed
ruby/ql/src/experimental/CWE-502 Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -20,10 +20,10 @@ import codeql.ruby.TaintTracking
20
20
import DataFlow:: PathGraph
21
21
import codeql.ruby.security.UnsafeDeserializationCustomizations
22
22
23
- abstract class YAMLSink extends DataFlow:: Node { }
23
+ abstract class YamlSink extends DataFlow:: Node { }
24
24
25
- class YamlunsafeLoadArgument extends YAMLSink {
26
- YamlunsafeLoadArgument ( ) {
25
+ class YamlUnsafeLoadArgument extends YamlSink {
26
+ YamlUnsafeLoadArgument ( ) {
27
27
this =
28
28
API:: getTopLevelMember ( [ "YAML" , "Psych" ] )
29
29
.getAMethodCall ( [ "unsafe_load_file" , "unsafe_load" , "load_stream" ] )
@@ -53,7 +53,7 @@ class Configuration extends TaintTracking::Configuration {
53
53
override predicate isSink ( DataFlow:: Node sink ) {
54
54
// for detecting The CVE we should uncomment following line
55
55
// sink.getLocation().getFile().toString().matches("%yaml_column%") and
56
- sink instanceof YAMLSink or
56
+ sink instanceof YamlSink or
57
57
sink =
58
58
API:: getTopLevelMember ( [ "YAML" , "Psych" ] )
59
59
.getAMethodCall ( [ "parse" , "parse_stream" , "parse_file" ] )
You can’t perform that action at this time.
0 commit comments