Module ServerSideRequestForgery
Provides default sources, sinks and sanitizers for detecting “Server-side request forgery” vulnerabilities, as well as extension points for adding your own.
Import path
import semmle.python.security.dataflow.ServerSideRequestForgeryCustomizationsClasses
| ConstCompareAsSanitizerGuard | A comparison with a constant, considered as a sanitizer-guard. |
| FullUrlControlSanitizer | A sanitizer for “Server-side request forgery” vulnerabilities, that ensures the attacker does not have full control of the URL. (that is, might still be able to control path or query parameters). |
| HttpRequestUrlAsSink | The URL of an HTTP request, considered as a sink. |
| RemoteFlowSourceAsSource | DEPRECATED: Use |
| Sanitizer | A sanitizer for “Server-side request forgery” vulnerabilities. |
| Sink | A data flow sink for “Server-side request forgery” vulnerabilities. |
| Source | A data flow source for “Server-side request forgery” vulnerabilities. |
| StringConstructionAsFullUrlControlSanitizer | A string construction (concat, format, f-string) where the left side is not user-controlled. |
Aliases
| StringConstCompareAsSanitizerGuard | DEPRECATED: Use ConstCompareAsSanitizerGuard instead. |