-
Notifications
You must be signed in to change notification settings - Fork 250
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Go]: New File System Access Sinks #782
Comments
Your submission is now in status Query review. For information, the evaluation workflow is the following: |
Hello @amammad Your submission adds fasthttp sinks. The fasthttp library is not modeled in CodeQL and if you'd like to, you could create a bug bounty submission modeling the whole library in CodeQL. Let us know what you think and if you'd like to pursue this idea. |
@sylwia-budzynska Thank you! I'm interested in writing a codeql library for fasthttp. just one question, There are other web frameworks that have already been implemented before, and each of these modeled frameworks can have a structure like |
@sylwia-budzynska I forgot that @pwntester gave me some suggestion before. Thank you both. |
Hi @pwntester |
@amammad 👋 I’m the one taking care of this submission, so I will answer. We have a number of scores that we rate all submissions on. Adding more and new sources could increase the scope metric in this submission. Your submission adds golang sinks for eight frameworks and libraries. It already has a very wide scope, so there’s no need to add more sources to it. Besides, these sources are already a part of your other submission with the DOS queries and so they cannot be a part of two submissions at the same time. All in all, this is already a very good submission in regards of scope. Looking forward to see more great submissions like these 👍 If you’d like to maximize payout for your future submissions, here are a few general guidelines, that we might take into consideration when reviewing a submission.
Please note that these are guidelines, not rules. Since we have a lot of different types of submissions, the guidelines might vary for each submission. Happy hacking! |
@sylwia-budzynska I didn't know who should I mention here because there aren't Assignees on this issue (and some other issues too) so I tried to mention your colleague/teammate too. Thank you so much for the comprehensive explanation. |
Your submission is now in status Final decision. For information, the evaluation workflow is the following: |
Your submission is now in status Pay. For information, the evaluation workflow is the following: |
Created Hackerone report 2206657 for bounty 520801 : [782] [Go]: New File System Access Sinks |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
Query PR
github/codeql#14064
Language
GoLang
CVE(s) ID list
CWE
CWE-022
Report
File System Access Sinks can are really valuable and can be used in multiple places to write security queries specially for writing Path Traversal detection queries.
I've added multiple New File System Access Sinks,
Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).
Blog post link
No response
The text was updated successfully, but these errors were encountered: