-
|
Now the following code, known index function first parameter request is user input can be used as a source, and then now known to deserialize function points in Tools#deserialize function, can be used as a sink. how to write QL rules to query this vulnerability? Code: I've written a rule, but it's a bit flawed and doesn't fully check out the entire path of request->bytes. my ql rules: |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 9 replies
-
|
This looks like it's working fine -- the source at |
Beta Was this translation helpful? Give feedback.

This looks like it's working fine -- the source at
getValueis detected,base64Decodeis known to propagate taint, thenTools.deserializeis recognised as the sink. What's the problem?