Skip to content

Commit 60e4533

Browse files
committed
Python: Move Xxe to new dataflow API
1 parent 4c76ca6 commit 60e4533

2 files changed

Lines changed: 17 additions & 4 deletions

File tree

python/ql/lib/semmle/python/security/dataflow/XxeQuery.qll

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,11 @@ import semmle.python.dataflow.new.TaintTracking
1212
import XxeCustomizations::Xxe
1313

1414
/**
15+
* DEPRECATED: Use `XxeFlow` module instead.
16+
*
1517
* A taint-tracking configuration for detecting "XML External Entity (XXE)" vulnerabilities.
1618
*/
17-
class Configuration extends TaintTracking::Configuration {
19+
deprecated class Configuration extends TaintTracking::Configuration {
1820
Configuration() { this = "Xxe" }
1921

2022
override predicate isSource(DataFlow::Node source) { source instanceof Source }
@@ -26,3 +28,14 @@ class Configuration extends TaintTracking::Configuration {
2628
node instanceof Sanitizer
2729
}
2830
}
31+
32+
private module XxeConfig implements DataFlow::ConfigSig {
33+
predicate isSource(DataFlow::Node source) { source instanceof Source }
34+
35+
predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
36+
37+
predicate isBarrier(DataFlow::Node node) { node instanceof Sanitizer }
38+
}
39+
40+
/** Global taint-tracking for detecting "XML External Entity (XXE)" vulnerabilities. */
41+
module XxeFlow = TaintTracking::Global<XxeConfig>;

python/ql/src/Security/CWE-611/Xxe.ql

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@
1414

1515
import python
1616
import semmle.python.security.dataflow.XxeQuery
17-
import DataFlow::PathGraph
17+
import XxeFlow::PathGraph
1818

19-
from Configuration cfg, DataFlow::PathNode source, DataFlow::PathNode sink
20-
where cfg.hasFlowPath(source, sink)
19+
from XxeFlow::PathNode source, XxeFlow::PathNode sink
20+
where XxeFlow::flowPath(source, sink)
2121
select sink.getNode(), source, sink,
2222
"XML parsing depends on a $@ without guarding against external entity expansion.",
2323
source.getNode(), "user-provided value"

0 commit comments

Comments
 (0)