|
7 | 7 | * @problem.severity error
|
8 | 8 | * @security-severity 6.1
|
9 | 9 | * @precision high
|
10 |
| - * @id java/netty-http-response-splitting |
| 10 | + * @id java/netty-http-request-or-response-splitting |
11 | 11 | * @tags security
|
| 12 | + * external/cwe/cwe-93 |
12 | 13 | * external/cwe/cwe-113
|
13 | 14 | */
|
14 | 15 |
|
15 | 16 | import java
|
| 17 | +import semmle.code.java.dataflow.FlowSources |
16 | 18 |
|
17 |
| -abstract private class InsecureNettyObjectCreation extends ClassInstanceExpr { } |
| 19 | +abstract private class InsecureNettyObjectCreation extends ClassInstanceExpr { |
| 20 | + int vulnerableArgumentIndex; |
18 | 21 |
|
19 |
| -private class InsecureDefaultHttpHeadersClassInstantiation extends InsecureNettyObjectCreation { |
| 22 | + InsecureNettyObjectCreation() { |
| 23 | + DataFlow::localExprFlow(any(CompileTimeConstantExpr ctce | ctce.getBooleanValue() = false), |
| 24 | + this.getArgument(vulnerableArgumentIndex)) |
| 25 | + } |
| 26 | + |
| 27 | + abstract string splittingType(); |
| 28 | +} |
| 29 | + |
| 30 | +abstract private class RequestOrResponseSplittingInsecureNettyObjectCreation extends InsecureNettyObjectCreation { |
| 31 | + override string splittingType() { result = "Request splitting or response splitting" } |
| 32 | +} |
| 33 | + |
| 34 | +/** |
| 35 | + * Request splitting can allowing an attacker to inject/smuggle an additional HTTP request into the socket connection. |
| 36 | + */ |
| 37 | +abstract private class RequestSplittingInsecureNettyObjectCreation extends InsecureNettyObjectCreation { |
| 38 | + override string splittingType() { result = "Request splitting" } |
| 39 | +} |
| 40 | + |
| 41 | +/** |
| 42 | + * Response splitting can lead to HTTP vulnerabilities like XSS and cache poisoning. |
| 43 | + */ |
| 44 | +abstract private class ResponseSplittingInsecureNettyObjectCreation extends InsecureNettyObjectCreation { |
| 45 | + override string splittingType() { result = "Response splitting" } |
| 46 | +} |
| 47 | + |
| 48 | +private class InsecureDefaultHttpHeadersClassInstantiation extends RequestOrResponseSplittingInsecureNettyObjectCreation { |
20 | 49 | InsecureDefaultHttpHeadersClassInstantiation() {
|
21 |
| - getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultHttpHeaders") and |
22 |
| - getArgument(0).(CompileTimeConstantExpr).getBooleanValue() = false |
| 50 | + this.getConstructedType() |
| 51 | + .hasQualifiedName("io.netty.handler.codec.http", |
| 52 | + ["DefaultHttpHeaders", "CombinedHttpHeaders"]) and |
| 53 | + vulnerableArgumentIndex = 0 |
23 | 54 | }
|
24 | 55 | }
|
25 | 56 |
|
26 |
| -private class InsecureDefaultHttpResponseClassInstantiation extends InsecureNettyObjectCreation { |
| 57 | +private class InsecureDefaultHttpResponseClassInstantiation extends ResponseSplittingInsecureNettyObjectCreation { |
27 | 58 | InsecureDefaultHttpResponseClassInstantiation() {
|
28 |
| - getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultHttpResponse") and |
29 |
| - getArgument(2).(CompileTimeConstantExpr).getBooleanValue() = false |
| 59 | + this.getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultHttpResponse") and |
| 60 | + vulnerableArgumentIndex = 2 |
| 61 | + } |
| 62 | +} |
| 63 | + |
| 64 | +private class InsecureDefaultHttpRequestClassInstantiation extends RequestSplittingInsecureNettyObjectCreation { |
| 65 | + InsecureDefaultHttpRequestClassInstantiation() { |
| 66 | + this.getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultHttpRequest") and |
| 67 | + vulnerableArgumentIndex = 3 |
30 | 68 | }
|
31 | 69 | }
|
32 | 70 |
|
33 |
| -private class InsecureDefaultFullHttpResponseClassInstantiation extends InsecureNettyObjectCreation { |
| 71 | +private class InsecureDefaultFullHttpResponseClassInstantiation extends ResponseSplittingInsecureNettyObjectCreation { |
34 | 72 | InsecureDefaultFullHttpResponseClassInstantiation() {
|
35 |
| - getConstructedType().hasQualifiedName("io.netty.handler.codec.http", "DefaultFullHttpResponse") and |
36 |
| - getArgument(3).(CompileTimeConstantExpr).getBooleanValue() = false |
| 73 | + this.getConstructedType() |
| 74 | + .hasQualifiedName("io.netty.handler.codec.http", "DefaultFullHttpResponse") and |
| 75 | + vulnerableArgumentIndex = [2, 3] |
| 76 | + } |
| 77 | +} |
| 78 | + |
| 79 | +private class InsecureDefaultFullHttpRequestClassInstantiation extends RequestSplittingInsecureNettyObjectCreation { |
| 80 | + InsecureDefaultFullHttpRequestClassInstantiation() { |
| 81 | + this.getConstructedType() |
| 82 | + .hasQualifiedName("io.netty.handler.codec.http", "DefaultFullHttpRequest") and |
| 83 | + vulnerableArgumentIndex = [3, 4] |
37 | 84 | }
|
38 | 85 | }
|
39 | 86 |
|
40 | 87 | from InsecureNettyObjectCreation new
|
41 |
| -select new, "Response-splitting vulnerability due to header value verification being disabled." |
| 88 | +select new, new.splittingType() + " vulnerability due to header value verification being disabled." |
0 commit comments