Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upCodeQL query to detect XSLT injections #75
Comments
|
Your submission is now in status CodeQL review. For information, the evaluation workflow is the following: |
|
Your submission is now in status SecLab finalize. For information, the evaluation workflow is the following: |
|
Your submission is now in status Pay. For information, the evaluation workflow is the following: |
|
Created Hackerone report 974368 for bounty 243563 : [75] CodeQL query to detect XSLT injections |
|
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
|
Thank you @xcorail ! |
|
@ggolawski we are going to tweet about your contribution, do you consent to be named, and if yes can you give us your twitter handle? (you can do it privately) |
|
@xcorail feel free to name me. My twitter handle is |
CVE ID(s)
There's no CVE for this.
Report
I created a query to detect XSLT injections in Java code. The query raises a flag if user-provided XSLT stylesheet is processed.
StreamSource,SAXSource,StAXSourceandDOMSourceare supported as well as creating theTransformerviaTemplates.XSLT injection can lead to RCE.
The details are present in PR: github/codeql#3363