Skip to content

CodeQL raises js/remote-property-injection finding #818

@MiikaKarkkainen

Description

@MiikaKarkkainen

Describe the bug
CodeQL javascript-security-extended-qls finds js/remote-property-injection vulnerability from tus-js-client dist/tus.js file.

To Reproduce
Prerequisites:

  • have CodeQL installed, ensure that queries are at least on version 2.1.2.
  • have a way to view SARIF content, e.g. Visual Studio Code's SARIF extension.
  1. Build tus-js-client library.
  2. Create CodeQL database from dist folder content: codeql database create ./codeql-db-dist --language=javascript --source-root=./dist/ --overwrite
  3. Run javascript-security-extended suite: codeql database analyze ./codeql-db-dist codeql/javascript-queries:codeql-suites/javascript-security-extended.qls --format=sarifv2.1.0 --output=codeql-results-dist.sarif
  4. Examine codeql-results-dist.sarif, it contains the mentioned vulnerability.

Expected behavior
A clear and concise description of what you expected to happen.

Setup details
Please provide following details, if applicable to your situation:

  • Runtime environment: Browser
  • Used tus-js-client version: 4.3.1

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions