Module ServerSideRequestForgery
Provides default sources, sinks and sanitizers for detecting “Server-side request forgery” vulnerabilities, as well as extension points for adding your own.
Import path
import semmle.python.security.dataflow.ServerSideRequestForgeryCustomizations
Classes
FullUrlControlSanitizer |
A sanitizer for “Server-side request forgery” vulnerabilities, that ensures the attacker does not have full control of the URL. (that is, might still be able to control path or query parameters). |
HttpRequestUrlAsSink |
The URL of an HTTP request, considered as a sink. |
RemoteFlowSourceAsSource |
A source of remote user input, considered as a flow source. |
Sanitizer |
A sanitizer for “Server-side request forgery” vulnerabilities. |
SanitizerGuard |
DEPRECATED: Use |
Sink |
A data flow sink for “Server-side request forgery” vulnerabilities. |
Source |
A data flow source for “Server-side request forgery” vulnerabilities. |
StringConstCompareAsSanitizerGuard |
A comparison with a constant string, considered as a sanitizer-guard. |
StringConstructionAsFullUrlControlSanitizer |
A string construction (concat, format, f-string) where the left side is not user-controlled. |