File tree Expand file tree Collapse file tree
java/ql/src/Security/CWE/CWE-489 Expand file tree Collapse file tree Original file line number Diff line number Diff line change 33 * @description An enabled debugger can allow for entry points in the application or reveal sensitive information.
44 * @kind problem
55 * @problem.severity warning
6+ * @security-severity 7.2
67 * @id java/android/debuggable-attribute-enabled
78 * @tags security
89 * external/cwe/cwe-489
910 * @precision very-high
10- * @security-severity 0.1
1111 */
1212
1313import java
@@ -17,5 +17,8 @@ from AndroidXmlAttribute androidXmlAttr
1717where
1818 androidXmlAttr .getName ( ) = "debuggable" and
1919 androidXmlAttr .getValue ( ) = "true" and
20- not androidXmlAttr .getLocation ( ) .toString ( ) .matches ( "%/build/%" )
20+ not androidXmlAttr .getLocation ( ) .getFile ( ) .getAbsolutePath ( ) .matches ( "%/build%" ) // USE THIS (from speaking with Tony) - 11 MRVA results
21+ //not androidXmlAttr.getLocation().toString().matches("%build%") // my original query - 2 MRVA results
22+ //not androidXmlAttr.getLocation().toString().matches("%/build%") // 11 MRVA results
23+ //not androidXmlAttr.getLocation().getFile().getAbsolutePath().matches("%build%") // 2 MRVA results...
2124select androidXmlAttr , "The 'debuggable' attribute is enabled."
You can’t perform that action at this time.
0 commit comments