You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I noticed that dataflow in Ruby isn't propagated to Kernel.sprintf formatted strings, e.g. the stored xss query should flag this code in an ERB template:
The string literal is parsed as a a single Ast::StringTextComponent, where it should probably also contain a Ast::StringInterpolationComponent. I tried to work around this problem using an additional taint step:
I noticed that dataflow in Ruby isn't propagated to Kernel.sprintf formatted strings, e.g. the stored xss query should flag this code in an ERB template:
The string literal is parsed as a a single
Ast::StringTextComponent, where it should probably also contain aAst::StringInterpolationComponent. I tried to work around this problem using an additional taint step:which works for the code snippet above, but doesn't work when the dataflow gets a bit more complex:
I tried the following, but it doesn't work:
How do I catch the insecure code snippet above using local dataflow?
The text was updated successfully, but these errors were encountered: