@@ -121,7 +121,7 @@ private module Lxml {
121121 */
122122 abstract class InstanceSource extends DataFlow:: LocalSourceNode {
123123 /** Holds if this instance is vulnerable to `kind`. */
124- abstract predicate vulnerableTo ( XML:: XMLParsingVulnerabilityKind kind ) ;
124+ abstract predicate vulnerableTo ( XML:: XmlParsingVulnerabilityKind kind ) ;
125125 }
126126
127127 /**
@@ -135,7 +135,7 @@ private module Lxml {
135135 }
136136
137137 // NOTE: it's not possible to change settings of a parser after constructing it
138- override predicate vulnerableTo ( XML:: XMLParsingVulnerabilityKind kind ) {
138+ override predicate vulnerableTo ( XML:: XmlParsingVulnerabilityKind kind ) {
139139 kind .isXxe ( ) and
140140 (
141141 // resolve_entities has default True
@@ -165,7 +165,7 @@ private module Lxml {
165165 API:: moduleImport ( "lxml" ) .getMember ( "etree" ) .getMember ( "get_default_parser" ) .getACall ( )
166166 }
167167
168- override predicate vulnerableTo ( XML:: XMLParsingVulnerabilityKind kind ) {
168+ override predicate vulnerableTo ( XML:: XmlParsingVulnerabilityKind kind ) {
169169 // as highlighted by
170170 // https://lxml.de/apidoc/lxml.etree.html?highlight=xmlparser#lxml.etree.XMLParser
171171 // by default XXE is allow. so as long as the default parser has not been
@@ -189,7 +189,7 @@ private module Lxml {
189189 }
190190
191191 /** Gets a reference to an `lxml.etree` parser instance, that is vulnerable to `kind`. */
192- DataFlow:: Node instanceVulnerableTo ( XML:: XMLParsingVulnerabilityKind kind ) {
192+ DataFlow:: Node instanceVulnerableTo ( XML:: XmlParsingVulnerabilityKind kind ) {
193193 exists ( InstanceSource origin | result = instance ( origin ) and origin .vulnerableTo ( kind ) )
194194 }
195195
@@ -201,7 +201,7 @@ private module Lxml {
201201
202202 override DataFlow:: Node getAnInput ( ) { result in [ this .getArg ( 0 ) , this .getArgByName ( "data" ) ] }
203203
204- override predicate vulnerableTo ( XML:: XMLParsingVulnerabilityKind kind ) {
204+ override predicate vulnerableTo ( XML:: XmlParsingVulnerabilityKind kind ) {
205205 this .calls ( instanceVulnerableTo ( kind ) , "feed" )
206206 }
207207
@@ -256,7 +256,7 @@ private module Lxml {
256256
257257 DataFlow:: Node getParserArg ( ) { result in [ this .getArg ( 1 ) , this .getArgByName ( "parser" ) ] }
258258
259- override predicate vulnerableTo ( XML:: XMLParsingVulnerabilityKind kind ) {
259+ override predicate vulnerableTo ( XML:: XmlParsingVulnerabilityKind kind ) {
260260 this .getParserArg ( ) = XMLParser:: instanceVulnerableTo ( kind )
261261 or
262262 kind .isXxe ( ) and
@@ -313,7 +313,7 @@ private module Lxml {
313313
314314 override DataFlow:: Node getAnInput ( ) { result in [ this .getArg ( 0 ) , this .getArgByName ( "source" ) ] }
315315
316- override predicate vulnerableTo ( XML:: XMLParsingVulnerabilityKind kind ) {
316+ override predicate vulnerableTo ( XML:: XmlParsingVulnerabilityKind kind ) {
317317 // note that there is no `resolve_entities` argument, so it's not possible to turn off XXE :O
318318 kind .isXxe ( )
319319 or
0 commit comments