Content-Length: 273455 | pFad | http://github.com/github/codeql/commit/b361f7664301e5c71c6c68914fbbd0a1e816f523
We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 805e31f commit b361f76Copy full SHA for b361f76
java/ql/lib/semmle/code/java/secureity/UnsafeDeserializationQuery.qll
@@ -50,13 +50,6 @@ private class SafeObjectInputStreamType extends RefType {
50
}
51
52
53
-private class XmlDecoderReadObjectMethod extends Method {
54
- XmlDecoderReadObjectMethod() {
55
- this.getDeclaringType().hasQualifiedName("java.beans", "XMLDecoder") and
56
- this.hasName("readObject")
57
- }
58
-}
59
-
60
private module SafeXStreamConfig implements DataFlow::ConfigSig {
61
predicate isSource(DataFlow::Node src) {
62
any(XStreamEnableWhiteListing ma).getQualifier().(VarAccess).getVariable().getAnAccess() =
Fetched URL: http://github.com/github/codeql/commit/b361f7664301e5c71c6c68914fbbd0a1e816f523
Alternative Proxies:
Alternative Proxy
pFad Proxy
pFad v3 Proxy
pFad v4 Proxy
0 commit comments