java.lang.security.audit.tainted-xpath-from-http-request.tainted-xpath-from-http-request
semgrep
Author
unknown
Download Count*
License
Detected input from a HTTPServletRequest going into a XPath evaluate or compile command. This could lead to xpath injection if variables passed into the evaluate or compile commands are not properly sanitized. Xpath injection could lead to unauthorized access to sensitive information in XML documents. Instead, thoroughly sanitize user input or use parameterized xpath queries if you can.
Run Locally
Run in CI
Defintion
rules:
- id: tainted-xpath-from-http-request
message: Detected input from a HTTPServletRequest going into a XPath evaluate or
compile command. This could lead to xpath injection if variables passed
into the evaluate or compile commands are not properly sanitized. Xpath
injection could lead to unauthorized access to sensitive information in
XML documents. Instead, thoroughly sanitize user input or use
parameterized xpath queries if you can.
languages:
- java
severity: WARNING
mode: taint
pattern-sources:
- patterns:
- pattern: |
(HttpServletRequest $REQ).$FUNC(...)
pattern-sinks:
- patterns:
- pattern-either:
- pattern: |
(javax.xml.xpath.XPath $XP).evaluate(...)
- pattern: |
(javax.xml.xpath.XPath $XP).compile(...).evaluate(...)
metadata:
category: security
technology:
- java
cwe:
- "CWE-643: Improper Neutralization of Data within XPath Expressions
('XPath Injection')"
owasp:
- A03:2021 - Injection
references:
- https://owasp.org/Top10/A03_2021-Injection
subcategory:
- vuln
likelihood: HIGH
impact: MEDIUM
confidence: MEDIUM
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
vulnerability_class:
- XPath Injection
Examples
tainted-xpath-from-http-request.java
/**
* OWASP Benchmark Project v1.2
*
* <p>This file is part of the Open Web Application Security Project (OWASP) Benchmark Project. For
* details, please see <a
* href="https://owasp.org/www-project-benchmark/">https://owasp.org/www-project-benchmark/</a>.
*
* <p>The OWASP Benchmark is free software: you can redistribute it and/or modify it under the terms
* of the GNU General Public License as published by the Free Software Foundation, version 2.
*
* <p>The OWASP Benchmark is distributed in the hope that it will be useful, but WITHOUT ANY
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
* PURPOSE. See the GNU General Public License for more details.
*
* @author Nick Sanidas
* @created 2015
*/
package org.owasp.benchmark.testcode;
import java.io.IOException;
import javax.servlet.ServletException;
import javax.servlet.annotation.WebServlet;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
@WebServlet(value = "/xpathi-00/BenchmarkTest00207")
public class BenchmarkTest00207 extends HttpServlet {
private static final long serialVersionUID = 1L;
@Override
public void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
doPost(request, response);
}
@Override
public void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html;charset=UTF-8");
String param = "";
if (request.getHeader("BenchmarkTest00207") != null) {
param = request.getHeader("BenchmarkTest00207");
}
// URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
param = java.net.URLDecoder.decode(param, "UTF-8");
String bar = "";
if (param != null) {
bar =
new String(
org.apache.commons.codec.binary.Base64.decodeBase64(
org.apache.commons.codec.binary.Base64.encodeBase64(
param.getBytes())));
}
try {
java.io.FileInputStream file =
new java.io.FileInputStream(
org.owasp.benchmark.helpers.Utils.getFileFromClasspath(
"employees.xml", this.getClass().getClassLoader()));
javax.xml.parsers.DocumentBuilderFactory builderFactory =
javax.xml.parsers.DocumentBuilderFactory.newInstance();
// Prevent XXE
builderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
javax.xml.parsers.DocumentBuilder builder = builderFactory.newDocumentBuilder();
org.w3c.dom.Document xmlDocument = builder.parse(file);
javax.xml.xpath.XPathFactory xpf = javax.xml.xpath.XPathFactory.newInstance();
javax.xml.xpath.XPath xp = xpf.newXPath();
String expression = "/Employees/Employee[@emplid='" + bar + "']";
// ruleid: tainted-xpath-from-http-request
String result = xp.evaluate(expression, xmlDocument);
response.getWriter().println("Your query results are: " + result + "<br/>");
} catch (javax.xml.xpath.XPathExpressionException
| javax.xml.parsers.ParserConfigurationException
| org.xml.sax.SAXException e) {
response.getWriter()
.println(
"Error parsing XPath input: '"
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(bar)
+ "'");
throw new ServletException(e);
}
}
}
@WebServlet(value = "/xpathi-00/BenchmarkTest01223")
public class BenchmarkTest01223 extends HttpServlet {
private static final long serialVersionUID = 1L;
@Override
public void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
doPost(request, response);
}
@Override
public void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html;charset=UTF-8");
String param = "";
java.util.Enumeration<String> headers = request.getHeaders("BenchmarkTest01223");
if (headers != null && headers.hasMoreElements()) {
param = headers.nextElement(); // just grab first element
}
// URL Decode the header value since req.getHeaders() doesn't. Unlike req.getParameters().
param = java.net.URLDecoder.decode(param, "UTF-8");
String bar = new Test().doSomething(request, param);
try {
java.io.FileInputStream file =
new java.io.FileInputStream(
org.owasp.benchmark.helpers.Utils.getFileFromClasspath(
"employees.xml", this.getClass().getClassLoader()));
javax.xml.parsers.DocumentBuilderFactory builderFactory =
javax.xml.parsers.DocumentBuilderFactory.newInstance();
// Prevent XXE
builderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
javax.xml.parsers.DocumentBuilder builder = builderFactory.newDocumentBuilder();
org.w3c.dom.Document xmlDocument = builder.parse(file);
javax.xml.xpath.XPathFactory xpf = javax.xml.xpath.XPathFactory.newInstance();
javax.xml.xpath.XPath xp = xpf.newXPath();
String expression = "/Employees/Employee[@emplid='" + bar + "']";
// ruleid: tainted-xpath-from-http-request
org.w3c.dom.NodeList nodeList = (org.w3c.dom.NodeList) xp.compile(expression).evaluate(xmlDocument, javax.xml.xpath.XPathConstants.NODESET);
response.getWriter().println("Your query results are: <br/>");
for (int i = 0; i < nodeList.getLength(); i++) {
org.w3c.dom.Element value = (org.w3c.dom.Element) nodeList.item(i);
response.getWriter().println(value.getTextContent() + "<br/>");
}
} catch (javax.xml.xpath.XPathExpressionException
| javax.xml.parsers.ParserConfigurationException
| org.xml.sax.SAXException e) {
response.getWriter()
.println(
"Error parsing XPath input: '"
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(bar)
+ "'");
throw new ServletException(e);
}
} // end doPost
private class Test {
public String doSomething(HttpServletRequest request, String param)
throws ServletException, IOException {
String bar;
String guess = "ABC";
char switchTarget = guess.charAt(2);
// Simple case statement that assigns param to bar on conditions 'A', 'C', or 'D'
switch (switchTarget) {
case 'A':
bar = param;
break;
case 'B':
bar = "bobs_your_uncle";
break;
case 'C':
case 'D':
bar = param;
break;
default:
bar = "bobs_your_uncle";
break;
}
return bar;
}
} // end innerclass Test
} // end DataflowThruInnerClass
@WebServlet(value = "/xpathi-00/BenchmarkTest00207")
public class BenchmarkTest00207 extends HttpServlet {
private static final long serialVersionUID = 1L;
@Override
public void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
doPost(request, response);
}
@Override
public void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html;charset=UTF-8");
String param = "";
if (request.getHeader("BenchmarkTest00207") != null) {
param = request.getHeader("BenchmarkTest00207");
}
// URL Decode the header value since req.getHeader() doesn't. Unlike req.getParameter().
param = java.net.URLDecoder.decode(param, "UTF-8");
String bar = "";
if (param != null) {
bar =
new String(
org.apache.commons.codec.binary.Base64.decodeBase64(
org.apache.commons.codec.binary.Base64.encodeBase64(
param.getBytes())));
}
try {
java.io.FileInputStream file =
new java.io.FileInputStream(
org.owasp.benchmark.helpers.Utils.getFileFromClasspath(
"employees.xml", this.getClass().getClassLoader()));
javax.xml.parsers.DocumentBuilderFactory builderFactory =
javax.xml.parsers.DocumentBuilderFactory.newInstance();
// Prevent XXE
builderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
javax.xml.parsers.DocumentBuilder builder = builderFactory.newDocumentBuilder();
org.w3c.dom.Document xmlDocument = builder.parse(file);
javax.xml.xpath.XPathFactory xpf = javax.xml.xpath.XPathFactory.newInstance();
javax.xml.xpath.XPath xp = xpf.newXPath();
String expression = "/Employees/Employee[@emplid='1234']";
// ok: tainted-xpath-from-http-request
String result = xp.evaluate(expression, xmlDocument);
response.getWriter().println("Your query results are: " + result + "<br/>");
} catch (javax.xml.xpath.XPathExpressionException
| javax.xml.parsers.ParserConfigurationException
| org.xml.sax.SAXException e) {
response.getWriter()
.println(
"Error parsing XPath input: '"
+ org.owasp.esapi.ESAPI.encoder().encodeForHTML(bar)
+ "'");
throw new ServletException(e);
}
}
}
Short Link: https://sg.run/3BvK