Module UrlRedirect
Provides default sources, sinks and sanitizers for detecting “URL redirection” vulnerabilities, as well as extension points for adding your own.
Import path
import codeql.ruby.security.UrlRedirectCustomizations
Predicates
actionControllerTaintedMethod | These methods return a new |
hashTaintedMethod | These |
isAdditionalTaintStep | Additional taint steps for “URL redirection” vulnerabilities. |
taintStepViaMethodCallReturnValue | Some methods will propagate taint to their return values. Here we cover a few common ones related to |
Classes
HttpRequestInputAccessAsSource | A source of remote user input, considered as a flow source. |
RedirectLocationAsSink | A HTTP redirect response, considered as a flow sink. |
Sanitizer | A sanitizer for “URL redirection” vulnerabilities. |
Sink | A data flow sink for “URL redirection” vulnerabilities. |
Source | A data flow source for “URL redirection” vulnerabilities. |
StringConstArrayInclusionAsSanitizer | A string concatenation against a constant list, considered as a sanitizer-guard. |
StringConstCompareAsSanitizer | A comparison with a constant string, considered as a sanitizer-guard. |
StringInterpolationAsSanitizer | A string interpolation, seen as a sanitizer for “URL redirection” vulnerabilities. |