@@ -6,7 +6,7 @@ private import semmle.code.java.dataflow.ExternalFlow
66
77/**
88 * A sink for Expresssion Language injection vulnerabilities via Jexl,
9- * i.e. method calls that run evaluation of a JEXL expression.
9+ * that is, method calls that run evaluation of a JEXL expression.
1010 */
1111abstract class JexlEvaluationSink extends DataFlow:: ExprNode { }
1212
@@ -79,7 +79,7 @@ private class DefaultJexlInjectionAdditionalTaintStep extends JexlInjectionAddit
7979
8080/**
8181 * Holds if `n1` to `n2` is a dataflow step that creates a JEXL script using an unsafe engine
82- * i.e. `tainted.createScript(jexlExpr)`.
82+ * by calling `tainted.createScript(jexlExpr)`.
8383 */
8484private predicate createJexlScriptStep ( DataFlow:: Node n1 , DataFlow:: Node n2 ) {
8585 exists ( MethodAccess ma , Method m | m = ma .getMethod ( ) and n2 .asExpr ( ) = ma |
@@ -92,7 +92,7 @@ private predicate createJexlScriptStep(DataFlow::Node n1, DataFlow::Node n2) {
9292
9393/**
9494 * Holds if `n1` to `n2` is a dataflow step that creates a JEXL expression using an unsafe engine
95- * i.e. `tainted.createExpression(jexlExpr)`.
95+ * by calling `tainted.createExpression(jexlExpr)`.
9696 */
9797private predicate createJexlExpressionStep ( DataFlow:: Node n1 , DataFlow:: Node n2 ) {
9898 exists ( MethodAccess ma , Method m | m = ma .getMethod ( ) and n2 .asExpr ( ) = ma |
@@ -105,7 +105,7 @@ private predicate createJexlExpressionStep(DataFlow::Node n1, DataFlow::Node n2)
105105
106106/**
107107 * Holds if `n1` to `n2` is a dataflow step that creates a JEXL template using an unsafe engine
108- * i.e. `tainted.createTemplate(jexlExpr)`.
108+ * by calling `tainted.createTemplate(jexlExpr)`.
109109 */
110110private predicate createJexlTemplateStep ( DataFlow:: Node n1 , DataFlow:: Node n2 ) {
111111 exists ( MethodAccess ma , Method m , RefType taintType |
0 commit comments