-
Now the following code, known index function first parameter request is user input can be used as a source, and then now known to deserialize function points in Tools#deserialize function, can be used as a sink. how to write QL rules to query this vulnerability? Code:
I've written a rule, but it's a bit flawed and doesn't fully check out the entire path of request->bytes. my ql rules:
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 9 replies
-
This looks like it's working fine -- the source at |
Beta Was this translation helpful? Give feedback.
This looks like it's working fine -- the source at
getValue
is detected,base64Decode
is known to propagate taint, thenTools.deserialize
is recognised as the sink. What's the problem?