Skip to content

Commit 46322b7

Browse files
committed
Python: Move XmlBomb to new dataflow API
1 parent add1077 commit 46322b7

2 files changed

Lines changed: 17 additions & 4 deletions

File tree

python/ql/lib/semmle/python/security/dataflow/XmlBombQuery.qll

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,11 @@ import semmle.python.dataflow.new.TaintTracking
1212
import XmlBombCustomizations::XmlBomb
1313

1414
/**
15+
* DEPRECATED: Use `XmlBombFlow` module instead.
16+
*
1517
* A taint-tracking configuration for detecting "XML bomb" vulnerabilities.
1618
*/
17-
class Configuration extends TaintTracking::Configuration {
19+
deprecated class Configuration extends TaintTracking::Configuration {
1820
Configuration() { this = "XmlBomb" }
1921

2022
override predicate isSource(DataFlow::Node source) { source instanceof Source }
@@ -26,3 +28,14 @@ class Configuration extends TaintTracking::Configuration {
2628
node instanceof Sanitizer
2729
}
2830
}
31+
32+
private module XmlBombConfig implements DataFlow::ConfigSig {
33+
predicate isSource(DataFlow::Node source) { source instanceof Source }
34+
35+
predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
36+
37+
predicate isBarrier(DataFlow::Node node) { node instanceof Sanitizer }
38+
}
39+
40+
/** Global taint-tracking for detecting "XML bomb" vulnerabilities. */
41+
module XmlBombFlow = TaintTracking::Global<XmlBombConfig>;

python/ql/src/Security/CWE-776/XmlBomb.ql

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@
1414

1515
import python
1616
import semmle.python.security.dataflow.XmlBombQuery
17-
import DataFlow::PathGraph
17+
import XmlBombFlow::PathGraph
1818

19-
from Configuration cfg, DataFlow::PathNode source, DataFlow::PathNode sink
20-
where cfg.hasFlowPath(source, sink)
19+
from XmlBombFlow::PathNode source, XmlBombFlow::PathNode sink
20+
where XmlBombFlow::flowPath(source, sink)
2121
select sink.getNode(), source, sink,
2222
"XML parsing depends on a $@ without guarding against uncontrolled entity expansion.",
2323
source.getNode(), "user-provided value"

0 commit comments

Comments
 (0)