File tree 1 file changed +51
-0
lines changed 1 file changed +51
-0
lines changed Original file line number Diff line number Diff line change
1
+ {
2
+ "namespace" : " com.diffblue.security" ,
3
+ "rules" :
4
+ [
5
+ {
6
+ "comment" : " Obtaining tainted XML text." ,
7
+ "class" : " Main" ,
8
+ "method" : " makeTainted:(Ljava/lang/String;)Ljava/lang/String;" ,
9
+ "result" : {
10
+ "location" : " returns" ,
11
+ "taint" : " Tainted XML text"
12
+ }
13
+ },
14
+ {
15
+ "comment" : " Obtaining tainted string reader from tainted XML text." ,
16
+ "class" : " java.io.StringReader" ,
17
+ "method" : " <init>:(Ljava/lang/String;)V" ,
18
+ "input" : {
19
+ "location" : " arg1" ,
20
+ "taint" : " Tainted XML text"
21
+ },
22
+ "result" : {
23
+ "location" : " this" ,
24
+ "taint" : " Tainted reader"
25
+ }
26
+ },
27
+ {
28
+ "comment" : " Obtaining XML stream reader with external entities enabled for tainted XML text." ,
29
+ "class" : " javax.xml.stream.DIFFBLUEXMLInputFactory" ,
30
+ "method" : " createXXEVulnerableXMLStreamReader:(Ljava/io/Reader;)Ljavax/xml/stream/XMLStreamReader;" ,
31
+ "input" : {
32
+ "location" : " arg1" ,
33
+ "taint" : " Tainted reader"
34
+ },
35
+ "result" : {
36
+ "location" : " returns" ,
37
+ "taint" : " Reader of tainted XML with external entities enabled"
38
+ }
39
+ },
40
+ {
41
+ "comment" : " Unmarshalling an object by reading tainted XML document with external entities enabled." ,
42
+ "class" : " javax.xml.bind.Unmarshaller" ,
43
+ "method" : " unmarshal:(Ljavax/xml/stream/XMLStreamReader;)Ljava/lang/Object;" ,
44
+ "sinkTarget" : {
45
+ "location" : " arg1" ,
46
+ "vulnerability" : " Reader of tainted XML with external entities enabled"
47
+ },
48
+ "message" : " Unmarshalling an object by reading tainted XML document with external entities enabled."
49
+ }
50
+ ]
51
+ }
You can’t perform that action at this time.
0 commit comments