Skip to content

Commit f251783

Browse files
Alvaro Muñozjorgectf
andcommitted
Apply suggestions from code review
Co-authored-by: Jorge <[email protected]>
1 parent d21d453 commit f251783

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

ql/src/Security/CWE-078/CommandInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,5 +34,5 @@ import MyFlow::PathGraph
3434
from MyFlow::PathNode source, MyFlow::PathNode sink
3535
where MyFlow::flowPath(source, sink)
3636
select sink.getNode(), source, sink,
37-
"Potential expression injection in $@, which may be controlled by an external user.", sink,
37+
"Potential command injection in $@, which may be controlled by an external user.", sink,
3838
sink.getNode().asExpr().(Expression).getRawExpression()

ql/src/Security/CWE-078/CriticalCommandInjection.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
* @problem.severity error
77
* @security-severity 9
88
* @precision high
9-
* @id actions/command-injection
9+
* @id actions/critical-command-injection
1010
* @tags actions
1111
* security
1212
* external/cwe/cwe-078
@@ -40,5 +40,5 @@ where
4040
w.hasTriggerEvent(source.getNode().(RemoteFlowSource).getATriggerEvent())
4141
)
4242
select sink.getNode(), source, sink,
43-
"Potential expression injection in $@, which may be controlled by an external user.", sink,
43+
"Potential critical command injection in $@, which may be controlled by an external user.", sink,
4444
sink.getNode().asExpr().(Expression).getRawExpression()

ql/src/Security/CWE-094/CodeInjection.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ import codeql.actions.dataflow.FlowSources
2020
import codeql.actions.dataflow.ExternalFlow
2121

2222
private class CodeInjectionSink extends DataFlow::Node {
23-
CodeInjectionSink() { externallyDefinedSink(this, "request-forgery") }
23+
CodeInjectionSink() { externallyDefinedSink(this, "code-injection") }
2424
}
2525

2626
private module MyConfig implements DataFlow::ConfigSig {
@@ -36,5 +36,5 @@ import MyFlow::PathGraph
3636
from MyFlow::PathNode source, MyFlow::PathNode sink
3737
where MyFlow::flowPath(source, sink)
3838
select sink.getNode(), source, sink,
39-
"Potential expression injection in $@, which may be controlled by an external user.", sink,
39+
"Potential code injection in $@, which may be controlled by an external user.", sink,
4040
sink.getNode().asExpr().(Expression).getRawExpression()

ql/src/Security/CWE-094/CriticalCodeInjection.ql

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
* @problem.severity error
77
* @security-severity 9
88
* @precision high
9-
* @id actions/code-injection
9+
* @id actions/critical-code-injection
1010
* @tags actions
1111
* security
1212
* external/cwe/cwe-094
@@ -20,7 +20,7 @@ import codeql.actions.dataflow.FlowSources
2020
import codeql.actions.dataflow.ExternalFlow
2121

2222
private class CodeInjectionSink extends DataFlow::Node {
23-
CodeInjectionSink() { externallyDefinedSink(this, "request-forgery") }
23+
CodeInjectionSink() { externallyDefinedSink(this, "code-injection") }
2424
}
2525

2626
private module MyConfig implements DataFlow::ConfigSig {
@@ -42,5 +42,5 @@ where
4242
w.hasTriggerEvent(source.getNode().(RemoteFlowSource).getATriggerEvent())
4343
)
4444
select sink.getNode(), source, sink,
45-
"Potential expression injection in $@, which may be controlled by an external user.", sink,
45+
"Potential critical code injection in $@, which may be controlled by an external user.", sink,
4646
sink.getNode().asExpr().(Expression).getRawExpression()

ql/src/Security/CWE-918/RequestForgery.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,5 +33,5 @@ import MyFlow::PathGraph
3333
from MyFlow::PathNode source, MyFlow::PathNode sink
3434
where MyFlow::flowPath(source, sink)
3535
select sink.getNode(), source, sink,
36-
"Potential expression injection in $@, which may be controlled by an external user.", sink,
36+
"Potential request forgery in $@, which may be controlled by an external user.", sink,
3737
sink.getNode().asExpr().(Expression).getRawExpression()

0 commit comments

Comments
 (0)