-
Notifications
You must be signed in to change notification settings - Fork 253
[porcupiney.hairs]: [Python] Add Flask Path injection sinks #407
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @porcupineyhairs in order to meet the new submission criteria, you need to support your submission with a CVE mapping (old or new) not previously covered by any existing CodeQL query. See https://securitylab.github.com/bounties for more details. And unfortunately, I can not consider your search in Github as valid results. I look forward to your CodeQL results :) Regards, |
@antonio-morales Just a quick update. I have found multiple valid results with this query. I applied for corresponding CVE mappings from MITRE a couple of weeks back but haven't heard back from them yet. So looks like this bounty application may have to be kept pending for some more time. |
Since the PR was looking good, I merged it to be part of the standard modeling for Python. |
With |
The CVE I found was used. |
@haby0 My query has multiple alerts. I have applied for a CVE for some of these alerts. But it's been almost two months now and I haven't been issued a CVE-ID by MITRE. To be clear, this query has enough detection to qualify for Bug Slayer but in the absence of a CVE-ID I can't do much. Your CVE which I use here is just speeding things up a bit while I wait on MITRE for a CVE ID. I am not claiming bounty for an otherwise ineligible report. |
I think you may have misunderstood my meaning. My original intention was mentioned in #463 yesterday. |
When this query was submitted there was no requirement for the query to find a new or existing CVE. |
@pwntester Well, I think this CVE can be used directly. @porcupineyhairs |
The PR is now merged. |
Your submission is now in status Test run. For information, the evaluation workflow is the following: |
Your submission is now in status Results analysis. For information, the evaluation workflow is the following: |
Your submission is now in status Query review. For information, the evaluation workflow is the following: |
Your submission is now in status Final decision. For information, the evaluation workflow is the following: |
This query has found the following CVE's and has approx 3-4 more pending processing currently in the pipeline. |
Your submission is now in status Pay. For information, the evaluation workflow is the following: |
Created Hackerone report 1413541 for bounty 352580 : [407] [porcupiney.hairs]: [Python] Add Flask Path injection sinks |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
Query
Relevant PR: github/codeql#6330
CVE ID(s)
No CVE's issued yet.
Report
Flask's
send_file
andsend_from_directory
calls can allow a remote attacker to potentially access any file stored on the system if the path is controlled by them.This can lead to a variety of issues such as
This query modifies the existing Python path injection query to add support for the same.
Result(s)
The query is not run on lgtm yet. However, by using fuzzy search, I was able to find out multiple true positives for this query.
The text was updated successfully, but these errors were encountered: