-
Notifications
You must be signed in to change notification settings - Fork 1.7k
[JAVA] Partial Path Traversal Vuln Query #9742
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[JAVA] Partial Path Traversal Vuln Query #9742
Conversation
smehta23
commented
Jun 28, 2022
- [JAVA] Partial Path Traversal Vuln Query
- Finish Partial Path Traversal Query
- Add additional tests from real world query run
Could you clarify if you're making a bounty application for this or not? |
Hi! This is submitted by my intern. I'd like him to turn this into a bounty application, if possible 🙂 |
Co-authored-by: Jonathan Leitschuh <jonathan.leitschuh@gmail.com>
Co-authored-by: Jonathan Leitschuh <jonathan.leitschuh@gmail.com>
Co-authored-by: Jonathan Leitschuh <jonathan.leitschuh@gmail.com>
Co-authored-by: Jonathan Leitschuh <jonathan.leitschuh@gmail.com>
Co-authored-by: Jonathan Leitschuh <jonathan.leitschuh@gmail.com>
"qhelp.dtd"> | ||
<qhelp> | ||
<overview> | ||
<p>User supplied file paths can often pose security risks if a program does not correctly handle them. In particular, if a user |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would change the position of "correctly" to become "does not handle them correctly"
<qhelp> | ||
<overview> | ||
<p>User supplied file paths can often pose security risks if a program does not correctly handle them. In particular, if a user | ||
is meant to access files under a certain directory but does not enters a path under that directory, they can gain access to |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's a typo here, "does not *enter"
<overview> | ||
<p>User supplied file paths can often pose security risks if a program does not correctly handle them. In particular, if a user | ||
is meant to access files under a certain directory but does not enters a path under that directory, they can gain access to | ||
(and potentially modify/delete) unexpected, possibly sensitive resources. </p> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
unexpectedly
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should it then be "...they can unexpectedly gain access to (and potentially modify/delete) possibly sensitive resources"?
(I've currently phrased it that way, but let me know if you'd prefer something different!)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can do both here, choice is yours :-)
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalFromRemote.qhelp
Outdated
Show resolved
Hide resolved
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalFromRemote.qhelp
Outdated
Show resolved
Hide resolved
…e.qhelp Co-authored-by: Chris Smowton <smowton@github.com>
…e.qhelp Co-authored-by: Chris Smowton <smowton@github.com>
Co-authored-by: Chris Smowton <smowton@github.com>
Co-authored-by: Chris Smowton <smowton@github.com>
A <p> at the top isn't allowed, and for some reason the inclusion is required to be a valid qhelp file.
I've pushed two commits that proved necessary to performance-evaluate this PR:
|
@github/docs-content-codeql highlighting @JLLeitschuh's request above to expedite docs review on this PR due to the author shortly finishing their internship. |
Pushed one further commit to autoformat ql to hopefully get tests passing. |
Performance eval completed with benign results; just need docs review now. |
Covering for the docs first responder here 👋🏻 - I added this PR to our board for review by the Docs team. Thanks for your patience 🙇🏻♀️ 😅 |
Apologies, I am on my own for 2 weeks, and am very busy, but will review this now. Thank you for your patience 🙇🏻♀️ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Apologies for the delay in reviewing this 😢
This LGTM 💖
I've made a few comments to bring the content in line with our content model.
Let me know if you have any questions 😃
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalFromRemote.ql
Outdated
Show resolved
Hide resolved
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalRemainder.inc.qhelp
Outdated
Show resolved
Hide resolved
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalRemainder.inc.qhelp
Outdated
Show resolved
Hide resolved
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalRemainder.inc.qhelp
Outdated
Show resolved
Hide resolved
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalFromRemote.qhelp
Outdated
Show resolved
Hide resolved
java/ql/src/Security/CWE/CWE-023/PartialPathTraversalRemainder.inc.qhelp
Outdated
Show resolved
Hide resolved
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
@JLLeitschuh @smehta23 was there ever a bounty application for this? |
We will submit one as soon as we both get back from Vegas |