Java: CWE-552 Query to detect configuration file/source code exposure from unsafe request dispatcher #6251
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Directly incorporating user input into HTTP requests dispatched from the Java EE
RequestDispatcher
without validating the input can allow any web application resource such as configuration files and source code to be disclosed.As stated in the Java API doc, when using a Java EE
RequestDispatcher
, requests may be dispatched to any part of the web application bypassing both implicit (no direct access to WEB-INF or META-INF) and explicit (defined by the web application) security constraints. Unsanitized user provided data must not be used to construct the path passed to theRequestDispatcher
as it is very likely to create a security vulnerability in the application.This query detects unsafe invocations of
RequestDispatcher
with user controlled input. Please consider to merge the PR. Thanks.