File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed
ruby/ql/src/experimental/CWE-502 Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -20,10 +20,10 @@ import codeql.ruby.TaintTracking
2020import DataFlow:: PathGraph
2121import codeql.ruby.security.UnsafeDeserializationCustomizations
2222
23- abstract class YAMLSink extends DataFlow:: Node { }
23+ abstract class YamlSink extends DataFlow:: Node { }
2424
25- class YamlunsafeLoadArgument extends YAMLSink {
26- YamlunsafeLoadArgument ( ) {
25+ class YamlUnsafeLoadArgument extends YamlSink {
26+ YamlUnsafeLoadArgument ( ) {
2727 this =
2828 API:: getTopLevelMember ( [ "YAML" , "Psych" ] )
2929 .getAMethodCall ( [ "unsafe_load_file" , "unsafe_load" , "load_stream" ] )
@@ -53,7 +53,7 @@ class Configuration extends TaintTracking::Configuration {
5353 override predicate isSink ( DataFlow:: Node sink ) {
5454 // for detecting The CVE we should uncomment following line
5555 // sink.getLocation().getFile().toString().matches("%yaml_column%") and
56- sink instanceof YAMLSink or
56+ sink instanceof YamlSink or
5757 sink =
5858 API:: getTopLevelMember ( [ "YAML" , "Psych" ] )
5959 .getAMethodCall ( [ "parse" , "parse_stream" , "parse_file" ] )
You can’t perform that action at this time.
0 commit comments