Provides a taint-tracking configuration for detecting “Server-side request forgery” vulnerabilities.
Note, for performance reasons: only import this file if
ServerSideRequestForgery::Configuration
is needed, otherwise
ServerSideRequestForgeryCustomizations
should be imported instead.
Import path
import semmle.python.security.dataflow.ServerSideRequestForgeryQuery
Imports
Concepts | Provides abstract classes representing generic concepts such as file system access or system command execution, for which individual framework libraries provide concrete subclasses. |
DataFlow | Provides a library for local (intra-procedural) and global (inter-procedural) data flow analysis: deciding whether data can flow from a source to a sink. |
ServerSideRequestForgery | Provides default sources, sinks and sanitizers for detecting “Server-side request forgery” vulnerabilities, as well as extension points for adding your own. |
TaintTracking | Provides classes for performing local (intra-procedural) and global (inter-procedural) taint-tracking analyses. |
Predicates
fullyControlledRequest | Holds if all URL parts of |
Classes
FullServerSideRequestForgeryConfiguration | DEPRECATED: Use |
PartialServerSideRequestForgeryConfiguration | DEPRECATED: Use |
Aliases
FullServerSideRequestForgeryFlow | Global taint-tracking for detecting “Full server-side request forgery” vulnerabilities. |
PartialServerSideRequestForgeryFlow | Global taint-tracking for detecting “partial server-side request forgery” vulnerabilities. |