We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 19e1d82 + 60f2fa9 commit aa8ebf4Copy full SHA for aa8ebf4
java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.ql
@@ -29,5 +29,12 @@ private class InsecureDefaultHttpResponseClassInstantiation extends InsecureNett
29
}
30
31
32
+private class InsecureDefaultFullHttpResponseClassInstantiation extends InsecureNettyObjectCreation {
33
+ InsecureDefaultFullHttpResponseClassInstantiation() {
34
+ getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultFullHttpResponse") and
35
+ getArgument(3).(CompileTimeConstantExpr).getBooleanValue() = false
36
+ }
37
+}
38
+
39
from InsecureNettyObjectCreation new
40
select new, "Response-splitting vulnerability due to header value verification being disabled."
0 commit comments