Module UrlRedirect
Provides default sources, sinks and sanitizers for detecting “URL redirection” vulnerabilities, as well as extension points for adding your own.
Import path
import codeql.ruby.security.UrlRedirectCustomizationsPredicates
| actionControllerTaintedMethod | These methods return a new |
| hashTaintedMethod | These |
| isAdditionalTaintStep | Additional taint steps for “URL redirection” vulnerabilities. |
| taintStepViaMethodCallReturnValue | Some methods will propagate taint to their return values. Here we cover a few common ones related to |
Classes
| HttpRequestInputAccessAsSource | A source of remote user input, considered as a flow source. |
| RedirectLocationAsSink | A HTTP redirect response, considered as a flow sink. |
| Sanitizer | A sanitizer for “URL redirection” vulnerabilities. |
| Sink | A data flow sink for “URL redirection” vulnerabilities. |
| Source | A data flow source for “URL redirection” vulnerabilities. |
| StringConstArrayInclusionAsSanitizer | A string concatenation against a constant list, considered as a sanitizer-guard. |
| StringConstCompareAsSanitizer | A comparison with a constant string, considered as a sanitizer-guard. |
| StringInterpolationAsSanitizer | A string interpolation, seen as a sanitizer for “URL redirection” vulnerabilities. |