From c417dc4da048980eaec997431ed589b1b3fb1ae8 Mon Sep 17 00:00:00 2001 From: Asger F Date: Mon, 16 Dec 2024 15:13:28 +0100 Subject: [PATCH] Ruby: use in ReflectedXss --- ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql b/ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql index 8cc60618cc5c..d0557679604f 100644 --- a/ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql +++ b/ruby/ql/src/queries/security/cwe-079/ReflectedXSS.ql @@ -15,9 +15,9 @@ import codeql.ruby.AST import codeql.ruby.security.ReflectedXSSQuery -import ReflectedXssFlow::PathGraph +import ReflectedXssFlow -from ReflectedXssFlow::PathNode source, ReflectedXssFlow::PathNode sink -where ReflectedXssFlow::flowPath(source, sink) +from PathNode source, PathNode sink +where flowPath(source, sink) select sink.getNode(), source, sink, "Cross-site scripting vulnerability due to a $@.", source.getNode(), "user-provided value"