Skip to content

Conversation

@erik-krogh
Copy link
Contributor

Gets a TN for CVE-2020-26274

@erik-krogh erik-krogh added the Awaiting evaluation Do not merge yet, this PR is waiting for an evaluation to finish label Jan 6, 2021
@erik-krogh erik-krogh requested a review from a team as a code owner January 6, 2021 19:11
@github-actions github-actions bot added the JS label Jan 6, 2021
Copy link
Contributor

@esbena esbena left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM except for a nit, two ideas for future work.

* Holds if `instance` is an instance of the access-path `ap`, and there exists a guard
* that ensures that `instance` is not equal to `char`.
*/
private predicate blocksCharInAccess(AccessPath ap, string char, Expr instance) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If the performance works out, we should try to move this SanitizedChar and blocksCharInAccess to TaintTracking.qll (lets make a separate issue for that).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So generalize the sanitizer such that other queries can use it?

…ellCommandConstructionCustomizations.qll

Co-authored-by: Esben Sparre Andreasen <esbena@github.com>
@erik-krogh
Copy link
Contributor Author

Evaluation looks fine.

@codeql-ci codeql-ci merged commit 807fc94 into github:main Jan 8, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Awaiting evaluation Do not merge yet, this PR is waiting for an evaluation to finish JS

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants