-
I'm trying to make a CodeQL query for the JMX/JNDI injection reported by GitHub security lab here: https://securitylab.github.com/advisories/GHSL-2023-229_GHSL-2023-230_kafka-ui/ I have a working query but I don't understand what are the "default" additional flow step. Without At the end of the path there is this method sequence where The vulnerability lies in the I've also included this So my question is why the taint is not propagated in |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
The CodeQL libraries contain models for many classes and methods from common libraries and frameworks, including things like I would have expected CodeQL to track flow through methods defined in your application. However, flow may not be found in case of intermediate steps through external methods and classes that have not been modelled. Another reason could be that your code contains a pattern that is not handled properly by the CodeQL analyzer. |
Beta Was this translation helpful? Give feedback.
The CodeQL libraries contain models for many classes and methods from common libraries and frameworks, including things like
newJMXConnector
. See: https://github.com/search?q=repo%3Agithub%2Fcodeql%20%2FnewJMXConnector%2F&type=codeI would have expected CodeQL to track flow through methods defined in your application. However, flow may not be found in case of intermediate steps through external methods and classes that have not been modelled. Another reason could be that your code contains a pattern that is not handled properly by the CodeQL analyzer.