File tree Expand file tree Collapse file tree 1 file changed +5
-2
lines changed
java/ql/src/Security/CWE/CWE-489 Expand file tree Collapse file tree 1 file changed +5
-2
lines changed Original file line number Diff line number Diff line change 3
3
* @description An enabled debugger can allow for entry points in the application or reveal sensitive information.
4
4
* @kind problem
5
5
* @problem.severity warning
6
+ * @security-severity 7.2
6
7
* @id java/android/debuggable-attribute-enabled
7
8
* @tags security
8
9
* external/cwe/cwe-489
9
10
* @precision very-high
10
- * @security-severity 0.1
11
11
*/
12
12
13
13
import java
@@ -17,5 +17,8 @@ from AndroidXmlAttribute androidXmlAttr
17
17
where
18
18
androidXmlAttr .getName ( ) = "debuggable" and
19
19
androidXmlAttr .getValue ( ) = "true" and
20
- not androidXmlAttr .getLocation ( ) .toString ( ) .matches ( "%/build/%" )
20
+ not androidXmlAttr .getLocation ( ) .getFile ( ) .getAbsolutePath ( ) .matches ( "%/build%" ) // USE THIS (from speaking with Tony) - 11 MRVA results
21
+ //not androidXmlAttr.getLocation().toString().matches("%build%") // my original query - 2 MRVA results
22
+ //not androidXmlAttr.getLocation().toString().matches("%/build%") // 11 MRVA results
23
+ //not androidXmlAttr.getLocation().getFile().getAbsolutePath().matches("%build%") // 2 MRVA results...
21
24
select androidXmlAttr , "The 'debuggable' attribute is enabled."
You can’t perform that action at this time.
0 commit comments