We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The following functions are vulnerable to Xpath injection as explained at https://owasp.org/www-community/attacks/XPATH_Injection
function queryXmlExpression(SimpleXMLElement $xml) : array|false|null { $expression = $_GET["expression"]; return $xml->xpath($expression); } function queryDomExpression(DOMXPath $xpath) : mixed { $expression = $_GET["expression"]; return $xpath->query($expression); } function evaluateDomExpression(DOMXPath $xpath) : mixed { $expression = $_GET["expression"]; return $xpath->evaluate($expression); }
Psalm returns no issue when run with --taint-analysis.
I'll write a PR in order to raise a new issue named TaintedXpath
The text was updated successfully, but these errors were encountered:
Xpath injection vimeo#10162
c16216b
Hey @cgocast, can you reproduce the issue on https://psalm.dev ?
Sorry, something went wrong.
Fixed by #10163
No branches or pull requests
The following functions are vulnerable to Xpath injection as explained at https://owasp.org/www-community/attacks/XPATH_Injection
Psalm returns no issue when run with --taint-analysis.
I'll write a PR in order to raise a new issue named TaintedXpath
The text was updated successfully, but these errors were encountered: