-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Java: queries about user-controlled URLs should be sanitized by enforcing a prefix #4530
Comments
Added a descriptive title |
Looks like as well as the XSS query's clause relating to user-controlled fetches, this should also apply to other URL-based queries like |
This issue is stale because it has been open 14 days with no activity. Comment or remove the |
I encountered the same problem when using codeql. Is this problem solved now? |
Hah, I'd forgotten about this. I ported this from Go when promoting the Java SSRF query from experimental (#5587). That should be generalised to other queries concerned with a user-controlled URL. |
Same as javascript, so many false-positive reports, particularly SSRF. |
Another category that would benefit from this is JNDI injections where attackers need to control the beginning of the url /cc @atorralba |
This comes from a discussion with @smowton over here.
Certain categories such as Open Redirect, SSRF and Android WebView URL injection will benefit from a sanitizer which would clean the taint in case the dataflow goes through a string prefix operation (concatenation, format strings, string buffers, string writer ...). Since not controlling the begging of the URL will severely decrease the exploitability of these issues.
The text was updated successfully, but these errors were encountered: