@@ -52,7 +52,7 @@ class AllowCredentialsHeaderWrite extends Http::HeaderWrite {
5252}
5353
5454module UntrustedToAllowOriginHeaderConfig implements DataFlow:: ConfigSig {
55- predicate isSource ( DataFlow:: Node source ) { source instanceof RemoteFlowSource }
55+ predicate isSource ( DataFlow:: Node source ) { source instanceof ThreatModelFlowSource }
5656
5757 additional predicate isSinkHW ( DataFlow:: Node sink , AllowOriginHeaderWrite hw ) {
5858 sink = hw .getValue ( )
@@ -70,21 +70,21 @@ module UntrustedToAllowOriginHeaderConfig implements DataFlow::ConfigSig {
7070}
7171
7272module UntrustedToAllowOriginConfigConfig implements DataFlow:: ConfigSig {
73- predicate isSource ( DataFlow:: Node source ) { source instanceof RemoteFlowSource }
73+ predicate isSource ( DataFlow:: Node source ) { source instanceof ThreatModelFlowSource }
7474
7575 additional predicate isSinkWrite ( DataFlow:: Node sink , GinCors:: AllowOriginsWrite w ) { sink = w }
7676
7777 predicate isSink ( DataFlow:: Node sink ) { isSinkWrite ( sink , _) }
7878}
7979
8080/**
81- * Tracks taint flowfor reasoning about when a `RemoteFlowSource ` flows to
81+ * Tracks taint flowfor reasoning about when a `ThreatModelFlowSource ` flows to
8282 * a `HeaderWrite` that writes an `Access-Control-Allow-Origin` header's value.
8383 */
8484module UntrustedToAllowOriginHeaderFlow = TaintTracking:: Global< UntrustedToAllowOriginHeaderConfig > ;
8585
8686/**
87- * Tracks taint flowfor reasoning about when a `RemoteFlowSource ` flows to
87+ * Tracks taint flowfor reasoning about when a `ThreatModelFlowSource ` flows to
8888 * a `AllowOriginsWrite` that writes an `Access-Control-Allow-Origin` header's value.
8989 */
9090module UntrustedToAllowOriginConfigFlow = TaintTracking:: Global< UntrustedToAllowOriginConfigConfig > ;
@@ -121,7 +121,7 @@ predicate allowCredentialsIsSetToTrue(DataFlow::ExprNode allowOriginHW) {
121121
122122/**
123123 * Holds if the provided `allowOriginHW` HeaderWrite's value is set using an
124- * RemoteFlowSource .
124+ * ThreatModelFlowSource .
125125 * The `message` parameter is populated with the warning message to be returned by the query.
126126 */
127127predicate flowsFromUntrustedToAllowOrigin ( DataFlow:: ExprNode allowOriginHW , string message ) {
@@ -169,7 +169,7 @@ class MapRead extends DataFlow::ElementReadNode {
169169}
170170
171171module FromUntrustedConfig implements DataFlow:: ConfigSig {
172- predicate isSource ( DataFlow:: Node source ) { source instanceof RemoteFlowSource }
172+ predicate isSource ( DataFlow:: Node source ) { source instanceof ThreatModelFlowSource }
173173
174174 predicate isSink ( DataFlow:: Node sink ) { isSinkCgn ( sink , _) }
175175
@@ -208,13 +208,13 @@ module FromUntrustedConfig implements DataFlow::ConfigSig {
208208}
209209
210210/**
211- * Tracks taint flow for reasoning about when a `RemoteFlowSource ` flows
211+ * Tracks taint flow for reasoning about when a `ThreatModelFlowSource ` flows
212212 * somewhere.
213213 */
214214module FromUntrustedFlow = TaintTracking:: Global< FromUntrustedConfig > ;
215215
216216/**
217- * Holds if the provided `allowOriginHW` is also destination of a `RemoteFlowSource `.
217+ * Holds if the provided `allowOriginHW` is also destination of a `ThreatModelFlowSource `.
218218 */
219219predicate flowsToGuardedByCheckOnUntrusted ( DataFlow:: ExprNode allowOriginHW ) {
220220 exists ( DataFlow:: Node sink , ControlFlow:: ConditionGuardNode cgn |
0 commit comments