Dataset Viewer
Auto-converted to Parquet Duplicate
prompt
stringclasses
1 value
completions
listlengths
2
1.33k
labels
listlengths
2
1.33k
source
stringclasses
1 value
other_info
dict
index
int64
0
719
cwe
stringclasses
9 values
language
stringclasses
6 values
Determine whether the {function_name} code is vulnerable or not.
[ "long dd_get_item_size(struct dump_dir *dd, const char *name)\n{", "", " long size = -1;\n char *iname = concat_path_file(dd->dd_dirname, name);\n struct stat statbuf;", " if (lstat(iname, &statbuf) == 0 && S_ISREG(statbuf.st_mode))\n size = statbuf.st_size;\n else\n {\n if (er...
[ 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 196, "char_start": 67, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_get_item_size", "line_changes": { "added": [ { "char_end": 103, "char_start": 63, "line": " if (!str_is_correct_filename(name))\n", "line_no": 3 }, { "char_end": 191, "char_start": 103, "line": " error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n", "line_no": 4 }, { "char_end": 192, "char_start": 191, "line": "\n", "line_no": 5 } ], "deleted": [] }, "vul_type": "cwe-022" }
0
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "long dd_get_item_size(struct dump_dir *dd, const char *name)\n{", " if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n", " long size = -1;\n char *iname = concat_path_file(dd->dd_dirname, name);\n struct stat statbuf;", ...
[ 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 196, "char_start": 67, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_get_item_size", "line_changes": { "added": [ { "char_end": 103, "char_start": 63, "line": " if (!str_is_correct_filename(name))\n", "line_no": 3 }, { "char_end": 191, "char_start": 103, "line": " error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n", "line_no": 4 }, { "char_end": 192, "char_start": 191, "line": "\n", "line_no": 5 } ], "deleted": [] }, "vul_type": "cwe-022" }
0
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def zmi_page_request(self, *args, **kwargs):\r\n request = self.REQUEST\r\n RESPONSE = request.RESPONSE\r\n SESSION = request.SESSION\r\n self._zmi_page_request()\r\n RESPONSE.setHeader('Expires',DateTime(request['ZMI_TIME']-10000).toZone('GMT+1').rfc822())\r\n RESPONSE.setHeader('Cac...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1363, "char_start": 1322, "chars": "self.getDocumentElement().id in path and " } ], "deleted": [] }, "commit_link": "github.com/zms-publishing/zms4/commit/3f28620d475220dfdb06f79787158ac50727c61a", "file_name": "ZMSItem.py", "func_name": "zmi_page_request", "line_changes": { "added": [ { "char_end": 1436, "char_start": 1313, "line": " if self.getDocumentElement().id in path and len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n", "line_no": 26 } ], "deleted": [ { "char_end": 1395, "char_start": 1313, "line": " if len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n", "line_no": 26 } ] }, "vul_type": "cwe-022" }
1
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def zmi_page_request(self, *args, **kwargs):\r\n request = self.REQUEST\r\n RESPONSE = request.RESPONSE\r\n SESSION = request.SESSION\r\n self._zmi_page_request()\r\n RESPONSE.setHeader('Expires',DateTime(request['ZMI_TIME']-10000).toZone('GMT+1').rfc822())\r\n RESPONSE.setHeader('Cac...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1363, "char_start": 1322, "chars": "self.getDocumentElement().id in path and " } ], "deleted": [] }, "commit_link": "github.com/zms-publishing/zms4/commit/3f28620d475220dfdb06f79787158ac50727c61a", "file_name": "ZMSItem.py", "func_name": "zmi_page_request", "line_changes": { "added": [ { "char_end": 1436, "char_start": 1313, "line": " if self.getDocumentElement().id in path and len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n", "line_no": 26 } ], "deleted": [ { "char_end": 1395, "char_start": 1313, "line": " if len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n", "line_no": 26 } ] }, "vul_type": "cwe-022" }
1
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "static int nntp_hcache_namer(const char *path, char *dest, size_t destlen)\n{", " return snprintf(dest, destlen, \"%s.hcache\", path);", "}" ]
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 81, "char_start": 79, "chars": "in" }, { "char_end": 85, "char_start": 82, "chars": " co" }, { "char_end": 90, "char_start": 87, "chars": "t =" }, { "char_end": 387, "char_start": 133, "chars": ";\n\n /* Strip out any directories in the path */\n char *first = strchr(dest, '/');\n char *last = strrchr(dest, '/');\n if (first && last && (last > first))\n {\n memmove(first, last, strlen(last) + 1);\n count -= (last - first);\n }\n\n return count" } ], "deleted": [ { "char_end": 81, "char_start": 79, "chars": "re" }, { "char_end": 84, "char_start": 83, "chars": "r" } ] }, "commit_link": "github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e", "file_name": "newsrc.c", "func_name": "nntp_hcache_namer", "line_changes": { "added": [ { "char_end": 135, "char_start": 77, "line": " int count = snprintf(dest, destlen, \"%s.hcache\", path);\n", "line_no": 3 }, { "char_end": 136, "char_start": 135, "line": "\n", "line_no": 4 }, { "char_end": 182, "char_start": 136, "line": " /* Strip out any directories in the path */\n", "line_no": 5 }, { "char_end": 217, "char_start": 182, "line": " char *first = strchr(dest, '/');\n", "line_no": 6 }, { "char_end": 252, "char_start": 217, "line": " char *last = strrchr(dest, '/');\n", "line_no": 7 }, { "char_end": 291, "char_start": 252, "line": " if (first && last && (last > first))\n", "line_no": 8 }, { "char_end": 295, "char_start": 291, "line": " {\n", "line_no": 9 }, { "char_end": 339, "char_start": 295, "line": " memmove(first, last, strlen(last) + 1);\n", "line_no": 10 }, { "char_end": 368, "char_start": 339, "line": " count -= (last - first);\n", "line_no": 11 }, { "char_end": 372, "char_start": 368, "line": " }\n", "line_no": 12 }, { "char_end": 373, "char_start": 372, "line": "\n", "line_no": 13 }, { "char_end": 389, "char_start": 373, "line": " return count;\n", "line_no": 14 } ], "deleted": [ { "char_end": 130, "char_start": 77, "line": " return snprintf(dest, destlen, \"%s.hcache\", path);\n", "line_no": 3 } ] }, "vul_type": "cwe-022" }
2
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int nntp_hcache_namer(const char *path, char *dest, size_t destlen)\n{", " int count = snprintf(dest, destlen, \"%s.hcache\", path);", " /* Strip out any directories in the path */\n char *first = strchr(dest, '/');\n char *last = strrchr(dest, '/');\n if (first && last && (last > first))\n {\n ...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 81, "char_start": 79, "chars": "in" }, { "char_end": 85, "char_start": 82, "chars": " co" }, { "char_end": 90, "char_start": 87, "chars": "t =" }, { "char_end": 387, "char_start": 133, "chars": ";\n\n /* Strip out any directories in the path */\n char *first = strchr(dest, '/');\n char *last = strrchr(dest, '/');\n if (first && last && (last > first))\n {\n memmove(first, last, strlen(last) + 1);\n count -= (last - first);\n }\n\n return count" } ], "deleted": [ { "char_end": 81, "char_start": 79, "chars": "re" }, { "char_end": 84, "char_start": 83, "chars": "r" } ] }, "commit_link": "github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e", "file_name": "newsrc.c", "func_name": "nntp_hcache_namer", "line_changes": { "added": [ { "char_end": 135, "char_start": 77, "line": " int count = snprintf(dest, destlen, \"%s.hcache\", path);\n", "line_no": 3 }, { "char_end": 136, "char_start": 135, "line": "\n", "line_no": 4 }, { "char_end": 182, "char_start": 136, "line": " /* Strip out any directories in the path */\n", "line_no": 5 }, { "char_end": 217, "char_start": 182, "line": " char *first = strchr(dest, '/');\n", "line_no": 6 }, { "char_end": 252, "char_start": 217, "line": " char *last = strrchr(dest, '/');\n", "line_no": 7 }, { "char_end": 291, "char_start": 252, "line": " if (first && last && (last > first))\n", "line_no": 8 }, { "char_end": 295, "char_start": 291, "line": " {\n", "line_no": 9 }, { "char_end": 339, "char_start": 295, "line": " memmove(first, last, strlen(last) + 1);\n", "line_no": 10 }, { "char_end": 368, "char_start": 339, "line": " count -= (last - first);\n", "line_no": 11 }, { "char_end": 372, "char_start": 368, "line": " }\n", "line_no": 12 }, { "char_end": 373, "char_start": 372, "line": "\n", "line_no": 13 }, { "char_end": 389, "char_start": 373, "line": " return count;\n", "line_no": 14 } ], "deleted": [ { "char_end": 130, "char_start": 77, "line": " return snprintf(dest, destlen, \"%s.hcache\", path);\n", "line_no": 3 } ] }, "vul_type": "cwe-022" }
2
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "std::string TarFileReader::extract(const string &_path) {\n if (_path.empty()) THROW(\"path cannot be empty\");\n if (!hasMore()) THROW(\"No more tar files\");", " string path = _path;", " if (SystemUtilities::isDirectory(path)) path += \"/\" + getFilename();", "\n LOG_DEBUG(5, \"Extracting: \" << path)...
[ 1, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 228, "char_start": 222, "chars": "{\n " }, { "char_end": 544, "char_start": 260, "chars": " // Check that path is under the target directory\n string a = SystemUtilities::getCanonicalPath(_path);\n string b = SystemUtilities::getCanonicalPath(path);\n if (!String::startsWith(b, a))\n THROW(\"Tar path points outside of the extraction directory: \" << path);\n }\n\n " }, { "char_end": 652, "char_start": 585, "chars": "switch (getType()) {\n case NORMAL_FILE: case CONTIGUOUS_FILE:\n " }, { "char_end": 851, "char_start": 696, "chars": ");\n case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n default: THROW(\"Unsupported tar file type \" << getType());\n }\n\n return getFilename(" } ], "deleted": [] }, "commit_link": "github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7", "file_name": "src/cbang/tar/TarFileReader.cpp", "func_name": "TarFileReader::extract", "line_changes": { "added": [ { "char_end": 224, "char_start": 180, "line": " if (SystemUtilities::isDirectory(path)) {\n", "line_no": 6 }, { "char_end": 257, "char_start": 224, "line": " path += \"/\" + getFilename();\n", "line_no": 7 }, { "char_end": 258, "char_start": 257, "line": "\n", "line_no": 8 }, { "char_end": 368, "char_start": 311, "line": " string a = SystemUtilities::getCanonicalPath(_path);\n", "line_no": 10 }, { "char_end": 424, "char_start": 368, "line": " string b = SystemUtilities::getCanonicalPath(path);\n", "line_no": 11 }, { "char_end": 459, "char_start": 424, "line": " if (!String::startsWith(b, a))\n", "line_no": 12 }, { "char_end": 537, "char_start": 459, "line": " THROW(\"Tar path points outside of the extraction directory: \" << path);\n", "line_no": 13 }, { "char_end": 541, "char_start": 537, "line": " }\n", "line_no": 14 }, { "char_end": 606, "char_start": 583, "line": " switch (getType()) {\n", "line_no": 18 }, { "char_end": 648, "char_start": 606, "line": " case NORMAL_FILE: case CONTIGUOUS_FILE:\n", "line_no": 19 }, { "char_end": 699, "char_start": 648, "line": " return extract(*SystemUtilities::oopen(path));\n", "line_no": 20 }, { "char_end": 764, "char_start": 699, "line": " case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n", "line_no": 21 }, { "char_end": 825, "char_start": 764, "line": " default: THROW(\"Unsupported tar file type \" << getType());\n", "line_no": 22 }, { "char_end": 829, "char_start": 825, "line": " }\n", "line_no": 23 }, { "char_end": 830, "char_start": 829, "line": "\n", "line_no": 24 }, { "char_end": 854, "char_start": 830, "line": " return getFilename();\n", "line_no": 25 } ], "deleted": [ { "char_end": 251, "char_start": 180, "line": " if (SystemUtilities::isDirectory(path)) path += \"/\" + getFilename();\n", "line_no": 6 }, { "char_end": 342, "char_start": 293, "line": " return extract(*SystemUtilities::oopen(path));\n", "line_no": 10 } ] }, "vul_type": "cwe-022" }
3
cwe-022
cpp
Determine whether the {function_name} code is vulnerable or not.
[ "std::string TarFileReader::extract(const string &_path) {\n if (_path.empty()) THROW(\"path cannot be empty\");\n if (!hasMore()) THROW(\"No more tar files\");", " string path = _path;", " if (SystemUtilities::isDirectory(path)) {\n path += \"/\" + getFilename();", " // Check that path is under the...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 228, "char_start": 222, "chars": "{\n " }, { "char_end": 544, "char_start": 260, "chars": " // Check that path is under the target directory\n string a = SystemUtilities::getCanonicalPath(_path);\n string b = SystemUtilities::getCanonicalPath(path);\n if (!String::startsWith(b, a))\n THROW(\"Tar path points outside of the extraction directory: \" << path);\n }\n\n " }, { "char_end": 652, "char_start": 585, "chars": "switch (getType()) {\n case NORMAL_FILE: case CONTIGUOUS_FILE:\n " }, { "char_end": 851, "char_start": 696, "chars": ");\n case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n default: THROW(\"Unsupported tar file type \" << getType());\n }\n\n return getFilename(" } ], "deleted": [] }, "commit_link": "github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7", "file_name": "src/cbang/tar/TarFileReader.cpp", "func_name": "TarFileReader::extract", "line_changes": { "added": [ { "char_end": 224, "char_start": 180, "line": " if (SystemUtilities::isDirectory(path)) {\n", "line_no": 6 }, { "char_end": 257, "char_start": 224, "line": " path += \"/\" + getFilename();\n", "line_no": 7 }, { "char_end": 258, "char_start": 257, "line": "\n", "line_no": 8 }, { "char_end": 368, "char_start": 311, "line": " string a = SystemUtilities::getCanonicalPath(_path);\n", "line_no": 10 }, { "char_end": 424, "char_start": 368, "line": " string b = SystemUtilities::getCanonicalPath(path);\n", "line_no": 11 }, { "char_end": 459, "char_start": 424, "line": " if (!String::startsWith(b, a))\n", "line_no": 12 }, { "char_end": 537, "char_start": 459, "line": " THROW(\"Tar path points outside of the extraction directory: \" << path);\n", "line_no": 13 }, { "char_end": 541, "char_start": 537, "line": " }\n", "line_no": 14 }, { "char_end": 606, "char_start": 583, "line": " switch (getType()) {\n", "line_no": 18 }, { "char_end": 648, "char_start": 606, "line": " case NORMAL_FILE: case CONTIGUOUS_FILE:\n", "line_no": 19 }, { "char_end": 699, "char_start": 648, "line": " return extract(*SystemUtilities::oopen(path));\n", "line_no": 20 }, { "char_end": 764, "char_start": 699, "line": " case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n", "line_no": 21 }, { "char_end": 825, "char_start": 764, "line": " default: THROW(\"Unsupported tar file type \" << getType());\n", "line_no": 22 }, { "char_end": 829, "char_start": 825, "line": " }\n", "line_no": 23 }, { "char_end": 830, "char_start": 829, "line": "\n", "line_no": 24 }, { "char_end": 854, "char_start": 830, "line": " return getFilename();\n", "line_no": 25 } ], "deleted": [ { "char_end": 251, "char_start": 180, "line": " if (SystemUtilities::isDirectory(path)) path += \"/\" + getFilename();\n", "line_no": 6 }, { "char_end": 342, "char_start": 293, "line": " return extract(*SystemUtilities::oopen(path));\n", "line_no": 10 } ] }, "vul_type": "cwe-022" }
3
cwe-022
cpp
Determine whether the {function_name} code is vulnerable or not.
[ "static void handle_method_call(GDBusConnection *connection,\n const gchar *caller,\n const gchar *object_path,\n const gchar *interface_name,\n const gchar *method_name,\n GVariant *parameters,\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
SVEN
{ "char_changes": { "added": [ { "char_end": 9241, "char_start": 9086, "chars": "allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }\n\n if (!" }, { "char_end": 11867, "char_start": 11712, "chars": "\n\n if (!allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }" }, { "char_end": 16546, "char_start": 16068, "chars": "\n\n if (!str_is_correct_filename(element))\n {\n log_notice(\"'%s' is not a valid element name\", element);\n char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n g_dbus_method_invocation_return_dbus_error(invocation,\n \"org.freedesktop.problems.InvalidElement\",\n error);\n\n free(error);\n return;\n }" } ], "deleted": [] }, "commit_link": "github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3", "file_name": "src/dbus/abrt-dbus.c", "func_name": "handle_method_call", "line_changes": { "added": [ { "char_end": 9119, "char_start": 9073, "line": " if (!allowed_problem_dir(problem_id))\n", "line_no": 259 }, { "char_end": 9129, "char_start": 9119, "line": " {\n", "line_no": 260 }, { "char_end": 9197, "char_start": 9129, "line": " return_InvalidProblemDir_error(invocation, problem_id);\n", "line_no": 261 }, { "char_end": 9217, "char_start": 9197, "line": " return;\n", "line_no": 262 }, { "char_end": 9227, "char_start": 9217, "line": " }\n", "line_no": 263 }, { "char_end": 9228, "char_start": 9227, "line": "\n", "line_no": 264 }, { "char_end": 11760, "char_start": 11714, "line": " if (!allowed_problem_dir(problem_id))\n", "line_no": 324 }, { "char_end": 11770, "char_start": 11760, "line": " {\n", "line_no": 325 }, { "char_end": 11838, "char_start": 11770, "line": " return_InvalidProblemDir_error(invocation, problem_id);\n", "line_no": 326 }, { "char_end": 11858, "char_start": 11838, "line": " return;\n", "line_no": 327 }, { "char_end": 11868, "char_start": 11858, "line": " }\n", "line_no": 328 }, { "char_end": 11869, "char_start": 11868, "line": "\n", "line_no": 329 }, { "char_end": 16117, "char_start": 16070, "line": " if (!str_is_correct_filename(element))\n", "line_no": 447 }, { "char_end": 16127, "char_start": 16117, "line": " {\n", "line_no": 448 }, { "char_end": 16196, "char_start": 16127, "line": " log_notice(\"'%s' is not a valid element name\", element);\n", "line_no": 449 }, { "char_end": 16281, "char_start": 16196, "line": " char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n", "line_no": 450 }, { "char_end": 16348, "char_start": 16281, "line": " g_dbus_method_invocation_return_dbus_error(invocation,\n", "line_no": 451 }, { "char_end": 16437, "char_start": 16348, "line": " \"org.freedesktop.problems.InvalidElement\",\n", "line_no": 452 }, { "char_end": 16491, "char_start": 16437, "line": " error);\n", "line_no": 453 }, { "char_end": 16492, "char_start": 16491, "line": "\n", "line_no": 454 }, { "char_end": 16517, "char_start": 16492, "line": " free(error);\n", "line_no": 455 }, { "char_end": 16537, "char_start": 16517, "line": " return;\n", "line_no": 456 }, { "char_end": 16547, "char_start": 16537, "line": " }\n", "line_no": 457 }, { "char_end": 16548, "char_start": 16547, "line": "\n", "line_no": 458 } ], "deleted": [] }, "vul_type": "cwe-022" }
4
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "static void handle_method_call(GDBusConnection *connection,\n const gchar *caller,\n const gchar *object_path,\n const gchar *interface_name,\n const gchar *method_name,\n GVariant *parameters,\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
SVEN
{ "char_changes": { "added": [ { "char_end": 9241, "char_start": 9086, "chars": "allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }\n\n if (!" }, { "char_end": 11867, "char_start": 11712, "chars": "\n\n if (!allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }" }, { "char_end": 16546, "char_start": 16068, "chars": "\n\n if (!str_is_correct_filename(element))\n {\n log_notice(\"'%s' is not a valid element name\", element);\n char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n g_dbus_method_invocation_return_dbus_error(invocation,\n \"org.freedesktop.problems.InvalidElement\",\n error);\n\n free(error);\n return;\n }" } ], "deleted": [] }, "commit_link": "github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3", "file_name": "src/dbus/abrt-dbus.c", "func_name": "handle_method_call", "line_changes": { "added": [ { "char_end": 9119, "char_start": 9073, "line": " if (!allowed_problem_dir(problem_id))\n", "line_no": 259 }, { "char_end": 9129, "char_start": 9119, "line": " {\n", "line_no": 260 }, { "char_end": 9197, "char_start": 9129, "line": " return_InvalidProblemDir_error(invocation, problem_id);\n", "line_no": 261 }, { "char_end": 9217, "char_start": 9197, "line": " return;\n", "line_no": 262 }, { "char_end": 9227, "char_start": 9217, "line": " }\n", "line_no": 263 }, { "char_end": 9228, "char_start": 9227, "line": "\n", "line_no": 264 }, { "char_end": 11760, "char_start": 11714, "line": " if (!allowed_problem_dir(problem_id))\n", "line_no": 324 }, { "char_end": 11770, "char_start": 11760, "line": " {\n", "line_no": 325 }, { "char_end": 11838, "char_start": 11770, "line": " return_InvalidProblemDir_error(invocation, problem_id);\n", "line_no": 326 }, { "char_end": 11858, "char_start": 11838, "line": " return;\n", "line_no": 327 }, { "char_end": 11868, "char_start": 11858, "line": " }\n", "line_no": 328 }, { "char_end": 11869, "char_start": 11868, "line": "\n", "line_no": 329 }, { "char_end": 16117, "char_start": 16070, "line": " if (!str_is_correct_filename(element))\n", "line_no": 447 }, { "char_end": 16127, "char_start": 16117, "line": " {\n", "line_no": 448 }, { "char_end": 16196, "char_start": 16127, "line": " log_notice(\"'%s' is not a valid element name\", element);\n", "line_no": 449 }, { "char_end": 16281, "char_start": 16196, "line": " char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n", "line_no": 450 }, { "char_end": 16348, "char_start": 16281, "line": " g_dbus_method_invocation_return_dbus_error(invocation,\n", "line_no": 451 }, { "char_end": 16437, "char_start": 16348, "line": " \"org.freedesktop.problems.InvalidElement\",\n", "line_no": 452 }, { "char_end": 16491, "char_start": 16437, "line": " error);\n", "line_no": 453 }, { "char_end": 16492, "char_start": 16491, "line": "\n", "line_no": 454 }, { "char_end": 16517, "char_start": 16492, "line": " free(error);\n", "line_no": 455 }, { "char_end": 16537, "char_start": 16517, "line": " return;\n", "line_no": 456 }, { "char_end": 16547, "char_start": 16537, "line": " }\n", "line_no": 457 }, { "char_end": 16548, "char_start": 16547, "line": "\n", "line_no": 458 } ], "deleted": [] }, "vul_type": "cwe-022" }
4
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def _inject_file_into_fs(fs, path, contents):\n absolute_path = os.path.join(fs, path.lstrip('/'))", " parent_dir = os.path.dirname(absolute_path)\n utils.execute('mkdir', '-p', parent_dir, run_as_root=True)", " utils.execute('tee', absolute_path, process_input=contents,\n run_as_root=True...
[ 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 57, "char_start": 43, "chars": ", append=False" }, { "char_end": 82, "char_start": 80, "chars": "_j" }, { "char_end": 96, "char_start": 83, "chars": "in_and_check_" }, { "char_end": 105, "char_start": 100, "chars": "_with" }, { "char_end": 110, "char_start": 107, "chars": "_fs" }, { "char_end": 134, "char_start": 133, "chars": "\n" }, { "char_end": 246, "char_start": 245, "chars": "\n" }, { "char_end": 264, "char_start": 250, "chars": "args = []\n " }, { "char_end": 286, "char_start": 265, "chars": "f append:\n arg" }, { "char_end": 291, "char_start": 288, "chars": "app" }, { "char_end": 294, "char_start": 292, "chars": "nd" }, { "char_end": 298, "char_start": 296, "chars": "-a" }, { "char_end": 304, "char_start": 299, "chars": ")\n " }, { "char_end": 318, "char_start": 306, "chars": "rgs.append(a" }, { "char_end": 333, "char_start": 330, "chars": ")\n\n" }, { "char_end": 351, "char_start": 334, "chars": " kwargs = dict(" }, { "char_end": 435, "char_start": 392, "chars": "\n\n utils.execute('tee', *args, **kwargs)" } ], "deleted": [ { "char_end": 69, "char_start": 67, "chars": "s." }, { "char_end": 76, "char_start": 73, "chars": ".jo" }, { "char_end": 218, "char_start": 216, "chars": "ut" }, { "char_end": 220, "char_start": 219, "chars": "l" }, { "char_end": 224, "char_start": 222, "chars": "ex" }, { "char_end": 229, "char_start": 225, "chars": "cute" }, { "char_end": 234, "char_start": 231, "chars": "tee" }, { "char_end": 236, "char_start": 235, "chars": "," }, { "char_end": 251, "char_start": 250, "chars": "," }, { "char_end": 285, "char_start": 275, "chars": "\n " } ] }, "commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7", "file_name": "nova/virt/disk/api.py", "func_name": "_inject_file_into_fs", "line_changes": { "added": [ { "char_end": 60, "char_start": 0, "line": "def _inject_file_into_fs(fs, path, contents, append=False):\n", "line_no": 1 }, { "char_end": 133, "char_start": 60, "line": " absolute_path = _join_and_check_path_within_fs(fs, path.lstrip('/'))\n", "line_no": 2 }, { "char_end": 134, "char_start": 133, "line": "\n", "line_no": 3 }, { "char_end": 246, "char_start": 245, "line": "\n", "line_no": 6 }, { "char_end": 260, "char_start": 246, "line": " args = []\n", "line_no": 7 }, { "char_end": 275, "char_start": 260, "line": " if append:\n", "line_no": 8 }, { "char_end": 301, "char_start": 275, "line": " args.append('-a')\n", "line_no": 9 }, { "char_end": 332, "char_start": 301, "line": " args.append(absolute_path)\n", "line_no": 10 }, { "char_end": 333, "char_start": 332, "line": "\n", "line_no": 11 }, { "char_end": 393, "char_start": 333, "line": " kwargs = dict(process_input=contents, run_as_root=True)\n", "line_no": 12 }, { "char_end": 394, "char_start": 393, "line": "\n", "line_no": 13 }, { "char_end": 435, "char_start": 394, "line": " utils.execute('tee', *args, **kwargs)\n", "line_no": 14 } ], "deleted": [ { "char_end": 276, "char_start": 212, "line": " utils.execute('tee', absolute_path, process_input=contents,\n", "line_no": 5 }, { "char_end": 303, "char_start": 276, "line": " run_as_root=True)\n", "line_no": 6 } ] }, "vul_type": "cwe-022" }
5
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _inject_file_into_fs(fs, path, contents, append=False):\n absolute_path = _join_and_check_path_within_fs(fs, path.lstrip('/'))\n", " parent_dir = os.path.dirname(absolute_path)\n utils.execute('mkdir', '-p', parent_dir, run_as_root=True)", "\n args = []\n if append:\n args.append('-a'...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 57, "char_start": 43, "chars": ", append=False" }, { "char_end": 82, "char_start": 80, "chars": "_j" }, { "char_end": 96, "char_start": 83, "chars": "in_and_check_" }, { "char_end": 105, "char_start": 100, "chars": "_with" }, { "char_end": 110, "char_start": 107, "chars": "_fs" }, { "char_end": 134, "char_start": 133, "chars": "\n" }, { "char_end": 246, "char_start": 245, "chars": "\n" }, { "char_end": 264, "char_start": 250, "chars": "args = []\n " }, { "char_end": 286, "char_start": 265, "chars": "f append:\n arg" }, { "char_end": 291, "char_start": 288, "chars": "app" }, { "char_end": 294, "char_start": 292, "chars": "nd" }, { "char_end": 298, "char_start": 296, "chars": "-a" }, { "char_end": 304, "char_start": 299, "chars": ")\n " }, { "char_end": 318, "char_start": 306, "chars": "rgs.append(a" }, { "char_end": 333, "char_start": 330, "chars": ")\n\n" }, { "char_end": 351, "char_start": 334, "chars": " kwargs = dict(" }, { "char_end": 435, "char_start": 392, "chars": "\n\n utils.execute('tee', *args, **kwargs)" } ], "deleted": [ { "char_end": 69, "char_start": 67, "chars": "s." }, { "char_end": 76, "char_start": 73, "chars": ".jo" }, { "char_end": 218, "char_start": 216, "chars": "ut" }, { "char_end": 220, "char_start": 219, "chars": "l" }, { "char_end": 224, "char_start": 222, "chars": "ex" }, { "char_end": 229, "char_start": 225, "chars": "cute" }, { "char_end": 234, "char_start": 231, "chars": "tee" }, { "char_end": 236, "char_start": 235, "chars": "," }, { "char_end": 251, "char_start": 250, "chars": "," }, { "char_end": 285, "char_start": 275, "chars": "\n " } ] }, "commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7", "file_name": "nova/virt/disk/api.py", "func_name": "_inject_file_into_fs", "line_changes": { "added": [ { "char_end": 60, "char_start": 0, "line": "def _inject_file_into_fs(fs, path, contents, append=False):\n", "line_no": 1 }, { "char_end": 133, "char_start": 60, "line": " absolute_path = _join_and_check_path_within_fs(fs, path.lstrip('/'))\n", "line_no": 2 }, { "char_end": 134, "char_start": 133, "line": "\n", "line_no": 3 }, { "char_end": 246, "char_start": 245, "line": "\n", "line_no": 6 }, { "char_end": 260, "char_start": 246, "line": " args = []\n", "line_no": 7 }, { "char_end": 275, "char_start": 260, "line": " if append:\n", "line_no": 8 }, { "char_end": 301, "char_start": 275, "line": " args.append('-a')\n", "line_no": 9 }, { "char_end": 332, "char_start": 301, "line": " args.append(absolute_path)\n", "line_no": 10 }, { "char_end": 333, "char_start": 332, "line": "\n", "line_no": 11 }, { "char_end": 393, "char_start": 333, "line": " kwargs = dict(process_input=contents, run_as_root=True)\n", "line_no": 12 }, { "char_end": 394, "char_start": 393, "line": "\n", "line_no": 13 }, { "char_end": 435, "char_start": 394, "line": " utils.execute('tee', *args, **kwargs)\n", "line_no": 14 } ], "deleted": [ { "char_end": 276, "char_start": 212, "line": " utils.execute('tee', absolute_path, process_input=contents,\n", "line_no": 5 }, { "char_end": 303, "char_start": 276, "line": " run_as_root=True)\n", "line_no": 6 } ] }, "vul_type": "cwe-022" }
5
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "set_interface_var(const char *iface,\n\t\t const char *var, const char *name,\n\t\t uint32_t val)\n{\n\tFILE *fp;\n\tchar spath[64+IFNAMSIZ];\t/* XXX: magic constant */\n\tif (snprintf(spath, sizeof(spath), var, iface) >= sizeof(spath))", "", "\t\treturn -1;", "\tif (access(spath, F_OK) != 0)\n\t\treturn -...
[ 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 325, "char_start": 240, "chars": "/* No path traversal */\n\tif (strstr(name, \"..\") || strchr(name, '/'))\n\t\treturn -1;\n\n\t" } ], "deleted": [] }, "commit_link": "github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc", "file_name": "device-linux.c", "func_name": "set_interface_var", "line_changes": { "added": [ { "char_end": 264, "char_start": 239, "line": "\t/* No path traversal */\n", "line_no": 10 }, { "char_end": 310, "char_start": 264, "line": "\tif (strstr(name, \"..\") || strchr(name, '/'))\n", "line_no": 11 }, { "char_end": 323, "char_start": 310, "line": "\t\treturn -1;\n", "line_no": 12 }, { "char_end": 324, "char_start": 323, "line": "\n", "line_no": 13 } ], "deleted": [] }, "vul_type": "cwe-022" }
6
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "set_interface_var(const char *iface,\n\t\t const char *var, const char *name,\n\t\t uint32_t val)\n{\n\tFILE *fp;\n\tchar spath[64+IFNAMSIZ];\t/* XXX: magic constant */\n\tif (snprintf(spath, sizeof(spath), var, iface) >= sizeof(spath))", "\t\treturn -1;", "\t/* No path traversal */\n\tif (strstr(name, \"..\...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 325, "char_start": 240, "chars": "/* No path traversal */\n\tif (strstr(name, \"..\") || strchr(name, '/'))\n\t\treturn -1;\n\n\t" } ], "deleted": [] }, "commit_link": "github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc", "file_name": "device-linux.c", "func_name": "set_interface_var", "line_changes": { "added": [ { "char_end": 264, "char_start": 239, "line": "\t/* No path traversal */\n", "line_no": 10 }, { "char_end": 310, "char_start": 264, "line": "\tif (strstr(name, \"..\") || strchr(name, '/'))\n", "line_no": 11 }, { "char_end": 323, "char_start": 310, "line": "\t\treturn -1;\n", "line_no": 12 }, { "char_end": 324, "char_start": 323, "line": "\n", "line_no": 13 } ], "deleted": [] }, "vul_type": "cwe-022" }
6
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def cut(self, key):\n try:", " self.etcd.delete(os.path.join(self.namespace, key))", " except etcd.EtcdKeyNotFound:\n return False\n except etcd.EtcdException as err:\n log_error(\"Error removing key %s: [%r]\" % (key, repr(err)))\n raise CSStore...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 72, "char_start": 71, "chars": "_" }, { "char_end": 79, "char_start": 73, "chars": "bsolut" }, { "char_end": 82, "char_start": 80, "chars": "_k" }, { "char_end": 85, "char_start": 83, "chars": "y(" } ], "deleted": [ { "char_end": 79, "char_start": 66, "chars": "os.path.join(" }, { "char_end": 85, "char_start": 84, "chars": "n" }, { "char_end": 88, "char_start": 86, "chars": "me" }, { "char_end": 92, "char_start": 89, "chars": "pac" }, { "char_end": 95, "char_start": 93, "chars": ", " } ] }, "commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4", "file_name": "custodia/store/etcdstore.py", "func_name": "cut", "line_changes": { "added": [ { "char_end": 91, "char_start": 37, "line": " self.etcd.delete(self._absolute_key(key))\n", "line_no": 3 } ], "deleted": [ { "char_end": 101, "char_start": 37, "line": " self.etcd.delete(os.path.join(self.namespace, key))\n", "line_no": 3 } ] }, "vul_type": "cwe-022" }
7
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def cut(self, key):\n try:", " self.etcd.delete(self._absolute_key(key))", " except etcd.EtcdKeyNotFound:\n return False\n except etcd.EtcdException as err:\n log_error(\"Error removing key %s: [%r]\" % (key, repr(err)))\n raise CSStoreError('Err...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 72, "char_start": 71, "chars": "_" }, { "char_end": 79, "char_start": 73, "chars": "bsolut" }, { "char_end": 82, "char_start": 80, "chars": "_k" }, { "char_end": 85, "char_start": 83, "chars": "y(" } ], "deleted": [ { "char_end": 79, "char_start": 66, "chars": "os.path.join(" }, { "char_end": 85, "char_start": 84, "chars": "n" }, { "char_end": 88, "char_start": 86, "chars": "me" }, { "char_end": 92, "char_start": 89, "chars": "pac" }, { "char_end": 95, "char_start": 93, "chars": ", " } ] }, "commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4", "file_name": "custodia/store/etcdstore.py", "func_name": "cut", "line_changes": { "added": [ { "char_end": 91, "char_start": 37, "line": " self.etcd.delete(self._absolute_key(key))\n", "line_no": 3 } ], "deleted": [ { "char_end": 101, "char_start": 37, "line": " self.etcd.delete(os.path.join(self.namespace, key))\n", "line_no": 3 } ] }, "vul_type": "cwe-022" }
7
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "wiki_handle_http_request(HttpRequest *req)\n{\n HttpResponse *res = http_response_new(req);\n char *page = http_request_get_path_info(req); \n char *command = http_request_get_query_string(req); \n char *wikitext = \"\";", " util_dehttpize(page); \t/* remove any encoding on...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1368, "char_start": 1356, "chars": "!page_name_i" }, { "char_end": 1374, "char_start": 1369, "chars": "_good" } ], "deleted": [ { "char_end": 1362, "char_start": 1357, "chars": "trchr" }, { "char_end": 1372, "char_start": 1367, "chars": ", '/'" } ] }, "commit_link": "github.com/yarolig/didiwiki/commit/5e5c796617e1712905dc5462b94bd5e6c08d15ea", "file_name": "src/wiki.c", "func_name": "wiki_handle_http_request", "line_changes": { "added": [ { "char_end": 1382, "char_start": 1350, "line": " if (!page_name_is_good(page))\n", "line_no": 54 } ], "deleted": [ { "char_end": 1375, "char_start": 1350, "line": " if (strchr(page, '/'))\n", "line_no": 54 } ] }, "vul_type": "cwe-022" }
8
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "wiki_handle_http_request(HttpRequest *req)\n{\n HttpResponse *res = http_response_new(req);\n char *page = http_request_get_path_info(req); \n char *command = http_request_get_query_string(req); \n char *wikitext = \"\";", " util_dehttpize(page); \t/* remove any encoding on...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1368, "char_start": 1356, "chars": "!page_name_i" }, { "char_end": 1374, "char_start": 1369, "chars": "_good" } ], "deleted": [ { "char_end": 1362, "char_start": 1357, "chars": "trchr" }, { "char_end": 1372, "char_start": 1367, "chars": ", '/'" } ] }, "commit_link": "github.com/yarolig/didiwiki/commit/5e5c796617e1712905dc5462b94bd5e6c08d15ea", "file_name": "src/wiki.c", "func_name": "wiki_handle_http_request", "line_changes": { "added": [ { "char_end": 1382, "char_start": 1350, "line": " if (!page_name_is_good(page))\n", "line_no": 54 } ], "deleted": [ { "char_end": 1375, "char_start": 1350, "line": " if (strchr(page, '/'))\n", "line_no": 54 } ] }, "vul_type": "cwe-022" }
8
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def candidate_paths_for_url(self, url):\n for root, prefix in self.directories:\n if url.startswith(prefix):", " yield os.path.join(root, url[len(prefix):])" ]
[ 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 151, "char_start": 145, "chars": "path =" }, { "char_end": 283, "char_start": 189, "chars": "\n if os.path.commonprefix((root, path)) == root:\n yield path" } ], "deleted": [ { "char_end": 150, "char_start": 145, "chars": "yield" } ] }, "commit_link": "github.com/evansd/whitenoise/commit/4d8a3ab1e97d7ddb18b3fa8b4909c92bad5529c6", "file_name": "whitenoise/base.py", "func_name": "candidate_paths_for_url", "line_changes": { "added": [ { "char_end": 190, "char_start": 129, "line": " path = os.path.join(root, url[len(prefix):])\n", "line_no": 4 }, { "char_end": 253, "char_start": 190, "line": " if os.path.commonprefix((root, path)) == root:\n", "line_no": 5 }, { "char_end": 283, "char_start": 253, "line": " yield path\n", "line_no": 6 } ], "deleted": [ { "char_end": 188, "char_start": 129, "line": " yield os.path.join(root, url[len(prefix):])\n", "line_no": 4 } ] }, "vul_type": "cwe-022" }
9
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def candidate_paths_for_url(self, url):\n for root, prefix in self.directories:\n if url.startswith(prefix):", " path = os.path.join(root, url[len(prefix):])\n if os.path.commonprefix((root, path)) == root:\n yield path" ]
[ 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 151, "char_start": 145, "chars": "path =" }, { "char_end": 283, "char_start": 189, "chars": "\n if os.path.commonprefix((root, path)) == root:\n yield path" } ], "deleted": [ { "char_end": 150, "char_start": 145, "chars": "yield" } ] }, "commit_link": "github.com/evansd/whitenoise/commit/4d8a3ab1e97d7ddb18b3fa8b4909c92bad5529c6", "file_name": "whitenoise/base.py", "func_name": "candidate_paths_for_url", "line_changes": { "added": [ { "char_end": 190, "char_start": 129, "line": " path = os.path.join(root, url[len(prefix):])\n", "line_no": 4 }, { "char_end": 253, "char_start": 190, "line": " if os.path.commonprefix((root, path)) == root:\n", "line_no": 5 }, { "char_end": 283, "char_start": 253, "line": " yield path\n", "line_no": 6 } ], "deleted": [ { "char_end": 188, "char_start": 129, "line": " yield os.path.join(root, url[len(prefix):])\n", "line_no": 4 } ] }, "vul_type": "cwe-022" }
9
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def updateKey(client):\n\t\"\"\"Updates the contents of a key that already exists in our system.\n\tReturns an error if the specified key doesn't exist for the specified user.\n\t\"\"\"\n\tglobal NOT_FOUND\n\tglobal CREATED", "\tvalidateClient(client)", "", "\tclient_pub_key = loadClientRSAKey(client)\n\ttok...
[ 1, 1, 0, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 406, "char_start": 369, "chars": ")\n\tvalidateKeyName(token_data['name']" } ], "deleted": [ { "char_end": 234, "char_start": 233, "chars": "\n" } ] }, "commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833", "file_name": "impl.py", "func_name": "updateKey", "line_changes": { "added": [ { "char_end": 408, "char_start": 371, "line": "\tvalidateKeyName(token_data['name'])\n", "line_no": 12 } ], "deleted": [ { "char_end": 234, "char_start": 233, "line": "\n", "line_no": 9 } ] }, "vul_type": "cwe-022" }
10
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def updateKey(client):\n\t\"\"\"Updates the contents of a key that already exists in our system.\n\tReturns an error if the specified key doesn't exist for the specified user.\n\t\"\"\"\n\tglobal NOT_FOUND\n\tglobal CREATED", "\tvalidateClient(client)", "", "\tclient_pub_key = loadClientRSAKey(client)\n\ttok...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 406, "char_start": 369, "chars": ")\n\tvalidateKeyName(token_data['name']" } ], "deleted": [ { "char_end": 234, "char_start": 233, "chars": "\n" } ] }, "commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833", "file_name": "impl.py", "func_name": "updateKey", "line_changes": { "added": [ { "char_end": 408, "char_start": 371, "line": "\tvalidateKeyName(token_data['name'])\n", "line_no": 12 } ], "deleted": [ { "char_end": 234, "char_start": 233, "line": "\n", "line_no": 9 } ] }, "vul_type": "cwe-022" }
10
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def create_basename_core(basename):\n try:\n basename = basename.casefold()\n except Exception:\n basename = basename.lower()\n", " basename = basename.replace(' ', '-')", " basename = re.sub(r'<[^>]*>', r'', basename)\n basename = re.sub(r'[^a-z0-9\\-]', r'', basename)\n basena...
[ 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 159, "char_start": 158, "chars": "r" }, { "char_end": 164, "char_start": 161, "chars": "sub" }, { "char_end": 166, "char_start": 165, "chars": "r" }, { "char_end": 168, "char_start": 167, "chars": "[" }, { "char_end": 173, "char_start": 169, "chars": "\\./]" }, { "char_end": 177, "char_start": 176, "chars": "r" }, { "char_end": 190, "char_start": 180, "chars": ", basename" } ], "deleted": [ { "char_end": 165, "char_start": 158, "chars": "basenam" }, { "char_end": 175, "char_start": 168, "chars": "eplace(" } ] }, "commit_link": "github.com/syegulalp/mercury/commit/3f7c7442fa49aec37577dbdb47ce11a848e7bd03", "file_name": "MeTal/core/utils.py", "func_name": "create_basename_core", "line_changes": { "added": [ { "char_end": 192, "char_start": 143, "line": " basename = re.sub(r'[ \\./]', r'-', basename)\n", "line_no": 7 } ], "deleted": [ { "char_end": 185, "char_start": 143, "line": " basename = basename.replace(' ', '-')\n", "line_no": 7 } ] }, "vul_type": "cwe-022" }
11
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def create_basename_core(basename):\n try:\n basename = basename.casefold()\n except Exception:\n basename = basename.lower()\n", " basename = re.sub(r'[ \\./]', r'-', basename)", " basename = re.sub(r'<[^>]*>', r'', basename)\n basename = re.sub(r'[^a-z0-9\\-]', r'', basename)\n ...
[ 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 159, "char_start": 158, "chars": "r" }, { "char_end": 164, "char_start": 161, "chars": "sub" }, { "char_end": 166, "char_start": 165, "chars": "r" }, { "char_end": 168, "char_start": 167, "chars": "[" }, { "char_end": 173, "char_start": 169, "chars": "\\./]" }, { "char_end": 177, "char_start": 176, "chars": "r" }, { "char_end": 190, "char_start": 180, "chars": ", basename" } ], "deleted": [ { "char_end": 165, "char_start": 158, "chars": "basenam" }, { "char_end": 175, "char_start": 168, "chars": "eplace(" } ] }, "commit_link": "github.com/syegulalp/mercury/commit/3f7c7442fa49aec37577dbdb47ce11a848e7bd03", "file_name": "MeTal/core/utils.py", "func_name": "create_basename_core", "line_changes": { "added": [ { "char_end": 192, "char_start": 143, "line": " basename = re.sub(r'[ \\./]', r'-', basename)\n", "line_no": 7 } ], "deleted": [ { "char_end": 185, "char_start": 143, "line": " basename = basename.replace(' ', '-')\n", "line_no": 7 } ] }, "vul_type": "cwe-022" }
11
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def get(self, key):\n try:", " result = self.etcd.get(os.path.join(self.namespace, key))", " except etcd.EtcdException as err:\n log_error(\"Error fetching key %s: [%r]\" % (key, repr(err)))\n raise CSStoreError('Error occurred while trying to get key')\n r...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 78, "char_start": 77, "chars": "_" }, { "char_end": 85, "char_start": 79, "chars": "bsolut" }, { "char_end": 88, "char_start": 86, "chars": "_k" }, { "char_end": 91, "char_start": 89, "chars": "y(" } ], "deleted": [ { "char_end": 85, "char_start": 72, "chars": "os.path.join(" }, { "char_end": 91, "char_start": 90, "chars": "n" }, { "char_end": 94, "char_start": 92, "chars": "me" }, { "char_end": 98, "char_start": 95, "chars": "pac" }, { "char_end": 101, "char_start": 99, "chars": ", " } ] }, "commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4", "file_name": "custodia/store/etcdstore.py", "func_name": "get", "line_changes": { "added": [ { "char_end": 97, "char_start": 37, "line": " result = self.etcd.get(self._absolute_key(key))\n", "line_no": 3 } ], "deleted": [ { "char_end": 107, "char_start": 37, "line": " result = self.etcd.get(os.path.join(self.namespace, key))\n", "line_no": 3 } ] }, "vul_type": "cwe-022" }
12
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def get(self, key):\n try:", " result = self.etcd.get(self._absolute_key(key))", " except etcd.EtcdException as err:\n log_error(\"Error fetching key %s: [%r]\" % (key, repr(err)))\n raise CSStoreError('Error occurred while trying to get key')\n return resu...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 78, "char_start": 77, "chars": "_" }, { "char_end": 85, "char_start": 79, "chars": "bsolut" }, { "char_end": 88, "char_start": 86, "chars": "_k" }, { "char_end": 91, "char_start": 89, "chars": "y(" } ], "deleted": [ { "char_end": 85, "char_start": 72, "chars": "os.path.join(" }, { "char_end": 91, "char_start": 90, "chars": "n" }, { "char_end": 94, "char_start": 92, "chars": "me" }, { "char_end": 98, "char_start": 95, "chars": "pac" }, { "char_end": 101, "char_start": 99, "chars": ", " } ] }, "commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4", "file_name": "custodia/store/etcdstore.py", "func_name": "get", "line_changes": { "added": [ { "char_end": 97, "char_start": 37, "line": " result = self.etcd.get(self._absolute_key(key))\n", "line_no": 3 } ], "deleted": [ { "char_end": 107, "char_start": 37, "line": " result = self.etcd.get(os.path.join(self.namespace, key))\n", "line_no": 3 } ] }, "vul_type": "cwe-022" }
12
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "PHYSICALPATH_FUNC(mod_alias_physical_handler) {\n\tplugin_data *p = p_d;\n\tint uri_len, basedir_len;\n\tchar *uri_ptr;\n\tsize_t k;", "\tif (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON;", "\tmod_alias_patch_connection(srv, con, p);", "\t/* not to include the tailing slash */\n\tbasedir_len = b...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1449, "char_start": 931, "chars": "/* check for path traversal in url-path following alias if key\n\t\t\t * does not end in slash, but replacement value ends in slash */\n\t\t\tif (uri_ptr[alias_len] == '.') {\n\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n\t\t\t\tif (*s == '.') ++s;\n\t\t\t\tif (*s == '/' || *s == '\\0') {\n\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n\t\t\t\t\t\tcon->http_status = 403;\n\t\t\t\t\t\treturn HANDLER_FINISHED;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t" } ], "deleted": [] }, "commit_link": "github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1", "file_name": "src/mod_alias.c", "func_name": "PHYSICALPATH_FUNC", "line_changes": { "added": [ { "char_end": 994, "char_start": 928, "line": "\t\t\t/* check for path traversal in url-path following alias if key\n", "line_no": 29 }, { "char_end": 1062, "char_start": 994, "line": "\t\t\t * does not end in slash, but replacement value ends in slash */\n", "line_no": 30 }, { "char_end": 1098, "char_start": 1062, "line": "\t\t\tif (uri_ptr[alias_len] == '.') {\n", "line_no": 31 }, { "char_end": 1137, "char_start": 1098, "line": "\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n", "line_no": 32 }, { "char_end": 1161, "char_start": 1137, "line": "\t\t\t\tif (*s == '.') ++s;\n", "line_no": 33 }, { "char_end": 1196, "char_start": 1161, "line": "\t\t\t\tif (*s == '/' || *s == '\\0') {\n", "line_no": 34 }, { "char_end": 1248, "char_start": 1196, "line": "\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n", "line_no": 35 }, { "char_end": 1308, "char_start": 1248, "line": "\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n", "line_no": 36 }, { "char_end": 1366, "char_start": 1308, "line": "\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n", "line_no": 37 }, { "char_end": 1396, "char_start": 1366, "line": "\t\t\t\t\t\tcon->http_status = 403;\n", "line_no": 38 }, { "char_end": 1427, "char_start": 1396, "line": "\t\t\t\t\t\treturn HANDLER_FINISHED;\n", "line_no": 39 }, { "char_end": 1434, "char_start": 1427, "line": "\t\t\t\t\t}\n", "line_no": 40 }, { "char_end": 1440, "char_start": 1434, "line": "\t\t\t\t}\n", "line_no": 41 }, { "char_end": 1445, "char_start": 1440, "line": "\t\t\t}\n", "line_no": 42 }, { "char_end": 1446, "char_start": 1445, "line": "\n", "line_no": 43 } ], "deleted": [] }, "vul_type": "cwe-022" }
13
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "PHYSICALPATH_FUNC(mod_alias_physical_handler) {\n\tplugin_data *p = p_d;\n\tint uri_len, basedir_len;\n\tchar *uri_ptr;\n\tsize_t k;", "\tif (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON;", "\tmod_alias_patch_connection(srv, con, p);", "\t/* not to include the tailing slash */\n\tbasedir_len = b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1449, "char_start": 931, "chars": "/* check for path traversal in url-path following alias if key\n\t\t\t * does not end in slash, but replacement value ends in slash */\n\t\t\tif (uri_ptr[alias_len] == '.') {\n\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n\t\t\t\tif (*s == '.') ++s;\n\t\t\t\tif (*s == '/' || *s == '\\0') {\n\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n\t\t\t\t\t\tcon->http_status = 403;\n\t\t\t\t\t\treturn HANDLER_FINISHED;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t" } ], "deleted": [] }, "commit_link": "github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1", "file_name": "src/mod_alias.c", "func_name": "PHYSICALPATH_FUNC", "line_changes": { "added": [ { "char_end": 994, "char_start": 928, "line": "\t\t\t/* check for path traversal in url-path following alias if key\n", "line_no": 29 }, { "char_end": 1062, "char_start": 994, "line": "\t\t\t * does not end in slash, but replacement value ends in slash */\n", "line_no": 30 }, { "char_end": 1098, "char_start": 1062, "line": "\t\t\tif (uri_ptr[alias_len] == '.') {\n", "line_no": 31 }, { "char_end": 1137, "char_start": 1098, "line": "\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n", "line_no": 32 }, { "char_end": 1161, "char_start": 1137, "line": "\t\t\t\tif (*s == '.') ++s;\n", "line_no": 33 }, { "char_end": 1196, "char_start": 1161, "line": "\t\t\t\tif (*s == '/' || *s == '\\0') {\n", "line_no": 34 }, { "char_end": 1248, "char_start": 1196, "line": "\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n", "line_no": 35 }, { "char_end": 1308, "char_start": 1248, "line": "\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n", "line_no": 36 }, { "char_end": 1366, "char_start": 1308, "line": "\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n", "line_no": 37 }, { "char_end": 1396, "char_start": 1366, "line": "\t\t\t\t\t\tcon->http_status = 403;\n", "line_no": 38 }, { "char_end": 1427, "char_start": 1396, "line": "\t\t\t\t\t\treturn HANDLER_FINISHED;\n", "line_no": 39 }, { "char_end": 1434, "char_start": 1427, "line": "\t\t\t\t\t}\n", "line_no": 40 }, { "char_end": 1440, "char_start": 1434, "line": "\t\t\t\t}\n", "line_no": 41 }, { "char_end": 1445, "char_start": 1440, "line": "\t\t\t}\n", "line_no": 42 }, { "char_end": 1446, "char_start": 1445, "line": "\n", "line_no": 43 } ], "deleted": [] }, "vul_type": "cwe-022" }
13
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def download_check_files(self, filelist):\n # only admins and allowed users may download\n if not cherrypy.session['admin']:\n uo = self.useroptions.forUser(self.getUserId())\n if not uo.getOptionValue('media.may_download'):\n return 'not_permitted'\n # mak...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 455, "char_start": 395, "chars": "# don't allow to traverse up in the file system\n " }, { "char_end": 625, "char_start": 469, "chars": " or f.startswith('../'):\n return 'invalid_file'\n # CVE-2015-8309: do not allow absolute file paths\n if os.path.isabs(f)" } ], "deleted": [] }, "commit_link": "github.com/devsnd/cherrymusic/commit/62dec34a1ea0741400dd6b6c660d303dcd651e86", "file_name": "cherrymusicserver/httphandler.py", "func_name": "download_check_files", "line_changes": { "added": [ { "char_end": 494, "char_start": 443, "line": " if '/../' in f or f.startswith('../'):\n", "line_no": 10 }, { "char_end": 532, "char_start": 494, "line": " return 'invalid_file'\n", "line_no": 11 }, { "char_end": 627, "char_start": 594, "line": " if os.path.isabs(f):\n", "line_no": 13 } ], "deleted": [ { "char_end": 411, "char_start": 383, "line": " if '/../' in f:\n", "line_no": 9 } ] }, "vul_type": "cwe-022" }
14
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def download_check_files(self, filelist):\n # only admins and allowed users may download\n if not cherrypy.session['admin']:\n uo = self.useroptions.forUser(self.getUserId())\n if not uo.getOptionValue('media.may_download'):\n return 'not_permitted'\n # mak...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 455, "char_start": 395, "chars": "# don't allow to traverse up in the file system\n " }, { "char_end": 625, "char_start": 469, "chars": " or f.startswith('../'):\n return 'invalid_file'\n # CVE-2015-8309: do not allow absolute file paths\n if os.path.isabs(f)" } ], "deleted": [] }, "commit_link": "github.com/devsnd/cherrymusic/commit/62dec34a1ea0741400dd6b6c660d303dcd651e86", "file_name": "cherrymusicserver/httphandler.py", "func_name": "download_check_files", "line_changes": { "added": [ { "char_end": 494, "char_start": 443, "line": " if '/../' in f or f.startswith('../'):\n", "line_no": 10 }, { "char_end": 532, "char_start": 494, "line": " return 'invalid_file'\n", "line_no": 11 }, { "char_end": 627, "char_start": 594, "line": " if os.path.isabs(f):\n", "line_no": 13 } ], "deleted": [ { "char_end": 411, "char_start": 383, "line": " if '/../' in f:\n", "line_no": 9 } ] }, "vul_type": "cwe-022" }
14
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def get_files(self, submit_id, password=None, astree=False):\n \"\"\"\n Returns files from a submitted analysis.\n @param password: The password to unlock container archives with\n @param astree: sflock option; determines the format in which the files are returned\n @return: A tr...
[ 1, 1, 0, 1, 0, 1, 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 638, "char_start": 637, "chars": "m" }, { "char_end": 718, "char_start": 717, "chars": "p" }, { "char_end": 721, "char_start": 720, "chars": "h" }, { "char_end": 870, "char_start": 857, "chars": "sanitize=True" } ], "deleted": [ { "char_end": 661, "char_start": 631, "chars": "data[\"data\"])\n " }, { "char_end": 675, "char_start": 665, "chars": "data = ope" }, { "char_end": 682, "char_start": 676, "chars": "(filep" }, { "char_end": 694, "char_start": 683, "chars": "th, \"rb\").r" }, { "char_end": 698, "char_start": 695, "chars": "ad(" }, { "char_end": 796, "char_start": 776, "chars": "name, contents=filed" }, { "char_end": 799, "char_start": 798, "chars": "a" }, { "char_end": 820, "char_start": 800, "chars": "\n " }, { "char_end": 1806, "char_start": 1791, "chars": "{\n \"" }, { "char_end": 1867, "char_start": 1811, "chars": "\": files,\n \"path\": submit.tmp_path,\n }" } ] }, "commit_link": "github.com/cuckoosandbox/cuckoo/commit/168cabf86730d56b7fa319278bf0f0034052666a", "file_name": "cuckoo/core/submit.py", "func_name": "get_files", "line_changes": { "added": [ { "char_end": 641, "char_start": 574, "line": " filepath = os.path.join(submit.tmp_path, filename)\n", "line_no": 14 }, { "char_end": 764, "char_start": 684, "line": " filepath=filepath, password=password, duplicates=duplicates\n", "line_no": 17 }, { "char_end": 872, "char_start": 810, "line": " unpacked = unpacked.astree(sanitize=True)\n", "line_no": 21 }, { "char_end": 1711, "char_start": 1691, "line": " return files\n", "line_no": 47 } ], "deleted": [ { "char_end": 645, "char_start": 574, "line": " filepath = os.path.join(submit.tmp_path, data[\"data\"])\n", "line_no": 14 }, { "char_end": 700, "char_start": 645, "line": " filedata = open(filepath, \"rb\").read()\n", "line_no": 15 }, { "char_end": 801, "char_start": 743, "line": " filepath=filename, contents=filedata,\n", "line_no": 18 }, { "char_end": 862, "char_start": 801, "line": " password=password, duplicates=duplicates\n", "line_no": 19 }, { "char_end": 957, "char_start": 908, "line": " unpacked = unpacked.astree()\n", "line_no": 23 }, { "char_end": 1793, "char_start": 1776, "line": " return {\n", "line_no": 49 }, { "char_end": 1821, "char_start": 1793, "line": " \"files\": files,\n", "line_no": 50 }, { "char_end": 1858, "char_start": 1821, "line": " \"path\": submit.tmp_path,\n", "line_no": 51 }, { "char_end": 1867, "char_start": 1858, "line": " }\n", "line_no": 52 } ] }, "vul_type": "cwe-022" }
15
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def get_files(self, submit_id, password=None, astree=False):\n \"\"\"\n Returns files from a submitted analysis.\n @param password: The password to unlock container archives with\n @param astree: sflock option; determines the format in which the files are returned\n @return: A tr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 638, "char_start": 637, "chars": "m" }, { "char_end": 718, "char_start": 717, "chars": "p" }, { "char_end": 721, "char_start": 720, "chars": "h" }, { "char_end": 870, "char_start": 857, "chars": "sanitize=True" } ], "deleted": [ { "char_end": 661, "char_start": 631, "chars": "data[\"data\"])\n " }, { "char_end": 675, "char_start": 665, "chars": "data = ope" }, { "char_end": 682, "char_start": 676, "chars": "(filep" }, { "char_end": 694, "char_start": 683, "chars": "th, \"rb\").r" }, { "char_end": 698, "char_start": 695, "chars": "ad(" }, { "char_end": 796, "char_start": 776, "chars": "name, contents=filed" }, { "char_end": 799, "char_start": 798, "chars": "a" }, { "char_end": 820, "char_start": 800, "chars": "\n " }, { "char_end": 1806, "char_start": 1791, "chars": "{\n \"" }, { "char_end": 1867, "char_start": 1811, "chars": "\": files,\n \"path\": submit.tmp_path,\n }" } ] }, "commit_link": "github.com/cuckoosandbox/cuckoo/commit/168cabf86730d56b7fa319278bf0f0034052666a", "file_name": "cuckoo/core/submit.py", "func_name": "get_files", "line_changes": { "added": [ { "char_end": 641, "char_start": 574, "line": " filepath = os.path.join(submit.tmp_path, filename)\n", "line_no": 14 }, { "char_end": 764, "char_start": 684, "line": " filepath=filepath, password=password, duplicates=duplicates\n", "line_no": 17 }, { "char_end": 872, "char_start": 810, "line": " unpacked = unpacked.astree(sanitize=True)\n", "line_no": 21 }, { "char_end": 1711, "char_start": 1691, "line": " return files\n", "line_no": 47 } ], "deleted": [ { "char_end": 645, "char_start": 574, "line": " filepath = os.path.join(submit.tmp_path, data[\"data\"])\n", "line_no": 14 }, { "char_end": 700, "char_start": 645, "line": " filedata = open(filepath, \"rb\").read()\n", "line_no": 15 }, { "char_end": 801, "char_start": 743, "line": " filepath=filename, contents=filedata,\n", "line_no": 18 }, { "char_end": 862, "char_start": 801, "line": " password=password, duplicates=duplicates\n", "line_no": 19 }, { "char_end": 957, "char_start": 908, "line": " unpacked = unpacked.astree()\n", "line_no": 23 }, { "char_end": 1793, "char_start": 1776, "line": " return {\n", "line_no": 49 }, { "char_end": 1821, "char_start": 1793, "line": " \"files\": files,\n", "line_no": 50 }, { "char_end": 1858, "char_start": 1821, "line": " \"path\": submit.tmp_path,\n", "line_no": 51 }, { "char_end": 1867, "char_start": 1858, "line": " }\n", "line_no": 52 } ] }, "vul_type": "cwe-022" }
15
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def handle(self, keepalive=True, initial_timeout=None):\n # we are requested to skip processing and keep the previous values\n if self.skip:\n return self.response.handle()", " # default to no keepalive in case something happens while even trying ensure we have a request\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1890, "char_start": 1827, "chars": ")\n self.resource = urllib.parse.unquote(resource" } ], "deleted": [ { "char_end": 1778, "char_start": 1773, "chars": "self." } ] }, "commit_link": "github.com/fkmclane/python-fooster-web/commit/80202a6d3788ad1212a162d19785c600025e6aa4", "file_name": "fooster/web/web.py", "func_name": "handle", "line_changes": { "added": [ { "char_end": 1829, "char_start": 1744, "line": " self.method, resource, self.request_http = self.request_line.split()\n", "line_no": 53 }, { "char_end": 1892, "char_start": 1829, "line": " self.resource = urllib.parse.unquote(resource)\n", "line_no": 54 } ], "deleted": [ { "char_end": 1834, "char_start": 1744, "line": " self.method, self.resource, self.request_http = self.request_line.split()\n", "line_no": 53 } ] }, "vul_type": "cwe-022" }
16
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def handle(self, keepalive=True, initial_timeout=None):\n # we are requested to skip processing and keep the previous values\n if self.skip:\n return self.response.handle()", " # default to no keepalive in case something happens while even trying ensure we have a request\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1890, "char_start": 1827, "chars": ")\n self.resource = urllib.parse.unquote(resource" } ], "deleted": [ { "char_end": 1778, "char_start": 1773, "chars": "self." } ] }, "commit_link": "github.com/fkmclane/python-fooster-web/commit/80202a6d3788ad1212a162d19785c600025e6aa4", "file_name": "fooster/web/web.py", "func_name": "handle", "line_changes": { "added": [ { "char_end": 1829, "char_start": 1744, "line": " self.method, resource, self.request_http = self.request_line.split()\n", "line_no": 53 }, { "char_end": 1892, "char_start": 1829, "line": " self.resource = urllib.parse.unquote(resource)\n", "line_no": 54 } ], "deleted": [ { "char_end": 1834, "char_start": 1744, "line": " self.method, self.resource, self.request_http = self.request_line.split()\n", "line_no": 53 } ] }, "vul_type": "cwe-022" }
16
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "int dd_delete_item(struct dump_dir *dd, const char *name)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */", "", "\n char *path = concat_path_file(dd->dd_dirname, name);\n int res = unlink(path);", " if (res < 0)\n {\n if (errno == ENOENT)\n ...
[ 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 276, "char_start": 149, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_delete_item", "line_changes": { "added": [ { "char_end": 185, "char_start": 145, "line": " if (!str_is_correct_filename(name))\n", "line_no": 6 }, { "char_end": 271, "char_start": 185, "line": " error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n", "line_no": 7 }, { "char_end": 272, "char_start": 271, "line": "\n", "line_no": 8 } ], "deleted": [] }, "vul_type": "cwe-022" }
17
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "int dd_delete_item(struct dump_dir *dd, const char *name)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */", "\n if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);", "\n char *path = concat...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 276, "char_start": 149, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_delete_item", "line_changes": { "added": [ { "char_end": 185, "char_start": 145, "line": " if (!str_is_correct_filename(name))\n", "line_no": 6 }, { "char_end": 271, "char_start": 185, "line": " error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n", "line_no": 7 }, { "char_end": 272, "char_start": 271, "line": "\n", "line_no": 8 } ], "deleted": [] }, "vul_type": "cwe-022" }
17
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def render(self, request):\n\t\taction = \"download\"\n\t\tif \"action\" in request.args:\n\t\t\taction = request.args[\"action\"][0]", "\t\tif \"file\" in request.args:", "\t\t\tfilename = request.args[\"file\"][0].decode('utf-8', 'ignore').encode('utf-8')\n\t\t\tfilename = re.sub(\"^/+\", \"/\", os.path.real...
[ 1, 1, 0, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 183, "char_start": 163, "chars": "lenient_force_utf_8(" }, { "char_end": 238, "char_start": 222, "chars": "sanitise_filenam" }, { "char_end": 240, "char_start": 239, "chars": "_" }, { "char_end": 247, "char_start": 241, "chars": "lashes" } ], "deleted": [ { "char_end": 227, "char_start": 186, "chars": ".decode('utf-8', 'ignore').encode('utf-8'" }, { "char_end": 244, "char_start": 243, "chars": "r" }, { "char_end": 246, "char_start": 245, "chars": "." }, { "char_end": 249, "char_start": 247, "chars": "ub" }, { "char_end": 262, "char_start": 250, "chars": "\"^/+\", \"/\", " } ] }, "commit_link": "github.com/E2OpenPlugins/e2openplugin-OpenWebif/commit/a846b7664eda3a4c51a452e00638cf7337dc2013", "file_name": "plugin/controllers/file.py", "func_name": "render", "line_changes": { "added": [ { "char_end": 208, "char_start": 149, "line": "\t\t\tfilename = lenient_force_utf_8(request.args[\"file\"][0])\n", "line_no": 7 }, { "char_end": 276, "char_start": 208, "line": "\t\t\tfilename = sanitise_filename_slashes(os.path.realpath(filename))\n", "line_no": 8 } ], "deleted": [ { "char_end": 229, "char_start": 149, "line": "\t\t\tfilename = request.args[\"file\"][0].decode('utf-8', 'ignore').encode('utf-8')\n", "line_no": 7 }, { "char_end": 290, "char_start": 229, "line": "\t\t\tfilename = re.sub(\"^/+\", \"/\", os.path.realpath(filename))\n", "line_no": 8 } ] }, "vul_type": "cwe-022" }
18
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def render(self, request):\n\t\taction = \"download\"\n\t\tif \"action\" in request.args:\n\t\t\taction = request.args[\"action\"][0]", "\t\tif \"file\" in request.args:", "\t\t\tfilename = lenient_force_utf_8(request.args[\"file\"][0])\n\t\t\tfilename = sanitise_filename_slashes(os.path.realpath(filename))", ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 183, "char_start": 163, "chars": "lenient_force_utf_8(" }, { "char_end": 238, "char_start": 222, "chars": "sanitise_filenam" }, { "char_end": 240, "char_start": 239, "chars": "_" }, { "char_end": 247, "char_start": 241, "chars": "lashes" } ], "deleted": [ { "char_end": 227, "char_start": 186, "chars": ".decode('utf-8', 'ignore').encode('utf-8'" }, { "char_end": 244, "char_start": 243, "chars": "r" }, { "char_end": 246, "char_start": 245, "chars": "." }, { "char_end": 249, "char_start": 247, "chars": "ub" }, { "char_end": 262, "char_start": 250, "chars": "\"^/+\", \"/\", " } ] }, "commit_link": "github.com/E2OpenPlugins/e2openplugin-OpenWebif/commit/a846b7664eda3a4c51a452e00638cf7337dc2013", "file_name": "plugin/controllers/file.py", "func_name": "render", "line_changes": { "added": [ { "char_end": 208, "char_start": 149, "line": "\t\t\tfilename = lenient_force_utf_8(request.args[\"file\"][0])\n", "line_no": 7 }, { "char_end": 276, "char_start": 208, "line": "\t\t\tfilename = sanitise_filename_slashes(os.path.realpath(filename))\n", "line_no": 8 } ], "deleted": [ { "char_end": 229, "char_start": 149, "line": "\t\t\tfilename = request.args[\"file\"][0].decode('utf-8', 'ignore').encode('utf-8')\n", "line_no": 7 }, { "char_end": 290, "char_start": 229, "line": "\t\t\tfilename = re.sub(\"^/+\", \"/\", os.path.realpath(filename))\n", "line_no": 8 } ] }, "vul_type": "cwe-022" }
18
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _inject_net_into_fs(net, fs, execute=None):\n \"\"\"Inject /etc/network/interfaces into the filesystem rooted at fs.", " net is the contents of /etc/network/interfaces.\n \"\"\"", " netdir = os.path.join(os.path.join(fs, 'etc'), 'network')", " utils.execute('mkdir', '-p', netdir, run_as_ro...
[ 1, 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 196, "char_start": 194, "chars": "_j" }, { "char_end": 210, "char_start": 197, "chars": "in_and_check_" }, { "char_end": 216, "char_start": 214, "chars": "_w" }, { "char_end": 224, "char_start": 221, "chars": "_fs" }, { "char_end": 431, "char_start": 430, "chars": "\n" }, { "char_end": 466, "char_start": 458, "chars": "'etc', '" }, { "char_end": 471, "char_start": 469, "chars": "wo" }, { "char_end": 474, "char_start": 472, "chars": "k'" }, { "char_end": 495, "char_start": 494, "chars": "_" }, { "char_end": 498, "char_start": 496, "chars": "nj" }, { "char_end": 505, "char_start": 501, "chars": "_fil" }, { "char_end": 509, "char_start": 506, "chars": "_in" }, { "char_end": 517, "char_start": 510, "chars": "o_fs(fs" } ], "deleted": [ { "char_end": 202, "char_start": 194, "chars": "os.path." }, { "char_end": 210, "char_start": 206, "chars": "(os." }, { "char_end": 217, "char_start": 214, "chars": ".jo" }, { "char_end": 230, "char_start": 229, "chars": ")" }, { "char_end": 458, "char_start": 456, "chars": "di" }, { "char_end": 480, "char_start": 479, "chars": "u" }, { "char_end": 485, "char_start": 483, "chars": "s." }, { "char_end": 490, "char_start": 486, "chars": "xecu" }, { "char_end": 492, "char_start": 491, "chars": "e" }, { "char_end": 498, "char_start": 493, "chars": "'tee'" }, { "char_end": 523, "char_start": 509, "chars": "process_input=" }, { "char_end": 544, "char_start": 526, "chars": ", run_as_root=True" } ] }, "commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7", "file_name": "nova/virt/disk/api.py", "func_name": "_inject_net_into_fs", "line_changes": { "added": [ { "char_end": 247, "char_start": 181, "line": " netdir = _join_and_check_path_within_fs(fs, 'etc', 'network')\n", "line_no": 6 }, { "char_end": 431, "char_start": 430, "line": "\n", "line_no": 10 }, { "char_end": 490, "char_start": 431, "line": " netfile = os.path.join('etc', 'network', 'interfaces')\n", "line_no": 11 }, { "char_end": 532, "char_start": 490, "line": " _inject_file_into_fs(fs, netfile, net)\n", "line_no": 12 } ], "deleted": [ { "char_end": 243, "char_start": 181, "line": " netdir = os.path.join(os.path.join(fs, 'etc'), 'network')\n", "line_no": 6 }, { "char_end": 475, "char_start": 426, "line": " netfile = os.path.join(netdir, 'interfaces')\n", "line_no": 10 }, { "char_end": 545, "char_start": 475, "line": " utils.execute('tee', netfile, process_input=net, run_as_root=True)\n", "line_no": 11 } ] }, "vul_type": "cwe-022" }
19
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _inject_net_into_fs(net, fs, execute=None):\n \"\"\"Inject /etc/network/interfaces into the filesystem rooted at fs.", " net is the contents of /etc/network/interfaces.\n \"\"\"", " netdir = _join_and_check_path_within_fs(fs, 'etc', 'network')", " utils.execute('mkdir', '-p', netdir, run_a...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 196, "char_start": 194, "chars": "_j" }, { "char_end": 210, "char_start": 197, "chars": "in_and_check_" }, { "char_end": 216, "char_start": 214, "chars": "_w" }, { "char_end": 224, "char_start": 221, "chars": "_fs" }, { "char_end": 431, "char_start": 430, "chars": "\n" }, { "char_end": 466, "char_start": 458, "chars": "'etc', '" }, { "char_end": 471, "char_start": 469, "chars": "wo" }, { "char_end": 474, "char_start": 472, "chars": "k'" }, { "char_end": 495, "char_start": 494, "chars": "_" }, { "char_end": 498, "char_start": 496, "chars": "nj" }, { "char_end": 505, "char_start": 501, "chars": "_fil" }, { "char_end": 509, "char_start": 506, "chars": "_in" }, { "char_end": 517, "char_start": 510, "chars": "o_fs(fs" } ], "deleted": [ { "char_end": 202, "char_start": 194, "chars": "os.path." }, { "char_end": 210, "char_start": 206, "chars": "(os." }, { "char_end": 217, "char_start": 214, "chars": ".jo" }, { "char_end": 230, "char_start": 229, "chars": ")" }, { "char_end": 458, "char_start": 456, "chars": "di" }, { "char_end": 480, "char_start": 479, "chars": "u" }, { "char_end": 485, "char_start": 483, "chars": "s." }, { "char_end": 490, "char_start": 486, "chars": "xecu" }, { "char_end": 492, "char_start": 491, "chars": "e" }, { "char_end": 498, "char_start": 493, "chars": "'tee'" }, { "char_end": 523, "char_start": 509, "chars": "process_input=" }, { "char_end": 544, "char_start": 526, "chars": ", run_as_root=True" } ] }, "commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7", "file_name": "nova/virt/disk/api.py", "func_name": "_inject_net_into_fs", "line_changes": { "added": [ { "char_end": 247, "char_start": 181, "line": " netdir = _join_and_check_path_within_fs(fs, 'etc', 'network')\n", "line_no": 6 }, { "char_end": 431, "char_start": 430, "line": "\n", "line_no": 10 }, { "char_end": 490, "char_start": 431, "line": " netfile = os.path.join('etc', 'network', 'interfaces')\n", "line_no": 11 }, { "char_end": 532, "char_start": 490, "line": " _inject_file_into_fs(fs, netfile, net)\n", "line_no": 12 } ], "deleted": [ { "char_end": 243, "char_start": 181, "line": " netdir = os.path.join(os.path.join(fs, 'etc'), 'network')\n", "line_no": 6 }, { "char_end": 475, "char_start": 426, "line": " netfile = os.path.join(netdir, 'interfaces')\n", "line_no": 10 }, { "char_end": 545, "char_start": 475, "line": " utils.execute('tee', netfile, process_input=net, run_as_root=True)\n", "line_no": 11 } ] }, "vul_type": "cwe-022" }
19
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def canonicalize(self):\n \"\"\"::", " path = path.canonicalize()\n", " Canonicalize path. ::", "\n # \"/foo/baz\"\n Pyjo.Path.new('/foo/./bar/../baz').canonicalize()", " # \"/../baz\"\n Pyjo.Path.new('/foo/../bar/../../baz').canonicalize...
[ 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 124, "char_start": 108, "chars": " by resolving ``" }, { "char_end": 171, "char_start": 125, "chars": "`` and ``..``, in addition ``...`` will be\n " }, { "char_end": 232, "char_start": 172, "chars": " treated as ``.`` to protect from path traversal attacks." }, { "char_end": 494, "char_start": 411, "chars": "\n\n # \"/foo/bar\"\n Pyjo.Path.new('/foo/.../bar').canonicalize()" }, { "char_end": 624, "char_start": 606, "chars": "' or parts[i] == '" }, { "char_end": 646, "char_start": 643, "chars": "..." } ], "deleted": [ { "char_end": 112, "char_start": 110, "chars": "::" } ] }, "commit_link": "github.com/dex4er/Pyjoyment/commit/e4b115bc80c41615b2133091af3a74ee5d995c2e", "file_name": "Pyjo/Path.py", "func_name": "canonicalize", "line_changes": { "added": [ { "char_end": 168, "char_start": 83, "line": " Canonicalize path by resolving ``.`` and ``..``, in addition ``...`` will be\n", "line_no": 6 }, { "char_end": 233, "char_start": 168, "line": " treated as ``.`` to protect from path traversal attacks.\n", "line_no": 7 }, { "char_end": 413, "char_start": 412, "line": "\n", "line_no": 14 }, { "char_end": 495, "char_start": 438, "line": " Pyjo.Path.new('/foo/.../bar').canonicalize()\n", "line_no": 16 }, { "char_end": 649, "char_start": 578, "line": " if parts[i] == '' or parts[i] == '.' or parts[i] == '...':\n", "line_no": 21 } ], "deleted": [ { "char_end": 113, "char_start": 83, "line": " Canonicalize path. ::\n", "line_no": 6 }, { "char_end": 425, "char_start": 375, "line": " if parts[i] == '.' or parts[i] == '':\n", "line_no": 17 } ] }, "vul_type": "cwe-022" }
20
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def canonicalize(self):\n \"\"\"::", " path = path.canonicalize()\n", " Canonicalize path by resolving ``.`` and ``..``, in addition ``...`` will be\n treated as ``.`` to protect from path traversal attacks.", "\n # \"/foo/baz\"\n Pyjo.Path.new('/foo/./ba...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 124, "char_start": 108, "chars": " by resolving ``" }, { "char_end": 171, "char_start": 125, "chars": "`` and ``..``, in addition ``...`` will be\n " }, { "char_end": 232, "char_start": 172, "chars": " treated as ``.`` to protect from path traversal attacks." }, { "char_end": 494, "char_start": 411, "chars": "\n\n # \"/foo/bar\"\n Pyjo.Path.new('/foo/.../bar').canonicalize()" }, { "char_end": 624, "char_start": 606, "chars": "' or parts[i] == '" }, { "char_end": 646, "char_start": 643, "chars": "..." } ], "deleted": [ { "char_end": 112, "char_start": 110, "chars": "::" } ] }, "commit_link": "github.com/dex4er/Pyjoyment/commit/e4b115bc80c41615b2133091af3a74ee5d995c2e", "file_name": "Pyjo/Path.py", "func_name": "canonicalize", "line_changes": { "added": [ { "char_end": 168, "char_start": 83, "line": " Canonicalize path by resolving ``.`` and ``..``, in addition ``...`` will be\n", "line_no": 6 }, { "char_end": 233, "char_start": 168, "line": " treated as ``.`` to protect from path traversal attacks.\n", "line_no": 7 }, { "char_end": 413, "char_start": 412, "line": "\n", "line_no": 14 }, { "char_end": 495, "char_start": 438, "line": " Pyjo.Path.new('/foo/.../bar').canonicalize()\n", "line_no": 16 }, { "char_end": 649, "char_start": 578, "line": " if parts[i] == '' or parts[i] == '.' or parts[i] == '...':\n", "line_no": 21 } ], "deleted": [ { "char_end": 113, "char_start": 83, "line": " Canonicalize path. ::\n", "line_no": 6 }, { "char_end": 425, "char_start": 375, "line": " if parts[i] == '.' or parts[i] == '':\n", "line_no": 17 } ] }, "vul_type": "cwe-022" }
20
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "CString CWebSock::GetSkinPath(const CString& sSkinName) {", " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkinName;", "\n if (!CFile::IsDir(sRet)) {", " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkinName;", "\n if (!CFile::IsDir(sRet)) {", " sRet =...
[ 1, 0, 1, 0, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 140, "char_start": 62, "chars": "const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n\n " } ], "deleted": [ { "char_end": 128, "char_start": 124, "chars": "Name" }, { "char_end": 228, "char_start": 224, "chars": "Name" }, { "char_end": 321, "char_start": 317, "chars": "Name" } ] }, "commit_link": "github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773", "file_name": "src/WebModules.cpp", "func_name": "CWebSock::GetSkinPath", "line_changes": { "added": [ { "char_end": 135, "char_start": 58, "line": " const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n", "line_no": 2 }, { "char_end": 136, "char_start": 135, "line": "\n", "line_no": 3 }, { "char_end": 204, "char_start": 136, "line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkin;\n", "line_no": 4 }, { "char_end": 300, "char_start": 236, "line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkin;\n", "line_no": 7 }, { "char_end": 389, "char_start": 336, "line": " sRet = CString(_SKINDIR_) + \"/\" + sSkin;\n", "line_no": 10 } ], "deleted": [ { "char_end": 130, "char_start": 58, "line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkinName;\n", "line_no": 2 }, { "char_end": 230, "char_start": 162, "line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkinName;\n", "line_no": 5 }, { "char_end": 323, "char_start": 266, "line": " sRet = CString(_SKINDIR_) + \"/\" + sSkinName;\n", "line_no": 8 } ] }, "vul_type": "cwe-022" }
21
cwe-022
cpp
Determine whether the {function_name} code is vulnerable or not.
[ "CString CWebSock::GetSkinPath(const CString& sSkinName) {", " const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");", " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkin;", "\n if (!CFile::IsDir(sRet)) {", " sRet = CZNC::Get().GetCurPath() + \"/webs...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 140, "char_start": 62, "chars": "const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n\n " } ], "deleted": [ { "char_end": 128, "char_start": 124, "chars": "Name" }, { "char_end": 228, "char_start": 224, "chars": "Name" }, { "char_end": 321, "char_start": 317, "chars": "Name" } ] }, "commit_link": "github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773", "file_name": "src/WebModules.cpp", "func_name": "CWebSock::GetSkinPath", "line_changes": { "added": [ { "char_end": 135, "char_start": 58, "line": " const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n", "line_no": 2 }, { "char_end": 136, "char_start": 135, "line": "\n", "line_no": 3 }, { "char_end": 204, "char_start": 136, "line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkin;\n", "line_no": 4 }, { "char_end": 300, "char_start": 236, "line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkin;\n", "line_no": 7 }, { "char_end": 389, "char_start": 336, "line": " sRet = CString(_SKINDIR_) + \"/\" + sSkin;\n", "line_no": 10 } ], "deleted": [ { "char_end": 130, "char_start": 58, "line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkinName;\n", "line_no": 2 }, { "char_end": 230, "char_start": 162, "line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkinName;\n", "line_no": 5 }, { "char_end": 323, "char_start": 266, "line": " sRet = CString(_SKINDIR_) + \"/\" + sSkinName;\n", "line_no": 8 } ] }, "vul_type": "cwe-022" }
21
cwe-022
cpp
Determine whether the {function_name} code is vulnerable or not.
[ "def addKey(client):\n\t\"\"\"Adds a new key with the specified name and contents.\n\tReturns an error if a key with the specified name already exists.\n\t\"\"\"\n\tglobal BAD_REQUEST\n\tglobal CREATED", "\tvalidateClient(client)", "", "\tclient_pub_key = loadClientRSAKey(client)\n\ttoken_data = decodeRequest...
[ 1, 1, 0, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 383, "char_start": 346, "chars": ")\n\tvalidateKeyName(token_data['name']" } ], "deleted": [ { "char_end": 211, "char_start": 210, "chars": "\n" } ] }, "commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833", "file_name": "impl.py", "func_name": "addKey", "line_changes": { "added": [ { "char_end": 385, "char_start": 348, "line": "\tvalidateKeyName(token_data['name'])\n", "line_no": 12 } ], "deleted": [ { "char_end": 211, "char_start": 210, "line": "\n", "line_no": 9 } ] }, "vul_type": "cwe-022" }
22
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def addKey(client):\n\t\"\"\"Adds a new key with the specified name and contents.\n\tReturns an error if a key with the specified name already exists.\n\t\"\"\"\n\tglobal BAD_REQUEST\n\tglobal CREATED", "\tvalidateClient(client)", "", "\tclient_pub_key = loadClientRSAKey(client)\n\ttoken_data = decodeRequest...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 383, "char_start": 346, "chars": ")\n\tvalidateKeyName(token_data['name']" } ], "deleted": [ { "char_end": 211, "char_start": 210, "chars": "\n" } ] }, "commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833", "file_name": "impl.py", "func_name": "addKey", "line_changes": { "added": [ { "char_end": 385, "char_start": 348, "line": "\tvalidateKeyName(token_data['name'])\n", "line_no": 12 } ], "deleted": [ { "char_end": 211, "char_start": 210, "line": "\n", "line_no": 9 } ] }, "vul_type": "cwe-022" }
22
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "void dd_save_text(struct dump_dir *dd, const char *name, const char *data)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n", "", " char *full_path = concat_path_file(dd->dd_dirname, name);\n save_binary_file(full_path, data, strlen(data), dd->dd_uid, dd->dd_gi...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 291, "char_start": 166, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_save_text", "line_changes": { "added": [ { "char_end": 202, "char_start": 162, "line": " if (!str_is_correct_filename(name))\n", "line_no": 6 }, { "char_end": 286, "char_start": 202, "line": " error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n", "line_no": 7 }, { "char_end": 287, "char_start": 286, "line": "\n", "line_no": 8 } ], "deleted": [] }, "vul_type": "cwe-022" }
23
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "void dd_save_text(struct dump_dir *dd, const char *name, const char *data)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n", " if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n", " char...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 291, "char_start": 166, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_save_text", "line_changes": { "added": [ { "char_end": 202, "char_start": 162, "line": " if (!str_is_correct_filename(name))\n", "line_no": 6 }, { "char_end": 286, "char_start": 202, "line": " error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n", "line_no": 7 }, { "char_end": 287, "char_start": 286, "line": "\n", "line_no": 8 } ], "deleted": [] }, "vul_type": "cwe-022" }
23
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def misc_file_checks(self):", " print_header(\"MISC FILE CHECKS\")", " #\n # Check for recommended and mandatory files\n #", " filenames = (\"manifest.json\", \"LICENSE\", \"README.md\",\n \"scripts/install\", \"scripts/remove\",\n \"...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1184, "char_start": 1153, "chars": "Analyze nginx conf\n # - " }, { "char_end": 1292, "char_start": 1240, "chars": " - Spot path traversal issue vulnerability\n #" }, { "char_end": 1437, "char_start": 1363, "chars": "# Ignore subdirs or filename not containing nginx in the name\n " }, { "char_end": 1518, "char_start": 1491, "chars": " or \"nginx\" not in filename" }, { "char_end": 1606, "char_start": 1544, "chars": "\n\n #\n # 'add_header' usage\n #" }, { "char_end": 3888, "char_start": 2089, "chars": "\n\n #\n # Path traversal issues\n #\n lines = open(self.path + \"/conf/\" + filename).readlines()\n lines = [line.strip() for line in lines if not line.strip().startswith(\"#\")]\n # Let's find the first location line\n location_line = None\n path_traversal_vulnerable = False\n lines_iter = lines.__iter__()\n for line in lines_iter:\n if line.startswith(\"location\"):\n location_line = line\n break\n # Look at the next lines for an 'alias' directive\n if location_line is not None:\n for line in lines_iter:\n if line.startswith(\"location\"):\n # Entering a new location block ... abort here\n # and assume there's no alias block later...\n break\n if line.startswith(\"alias\"):\n # We should definitely check for path traversal issue\n # Does the location target ends with / ?\n target = location_line.split()[-2]\n if not target.endswith(\"/\"):\n path_traversal_vulnerable = True\n break\n if path_traversal_vulnerable:\n print_warning(\n \"The nginx configuration appears vulnerable to path traversal as explained in \"\n \"https://www.acunetix.com/vulnerabilities/web/path-traversal-via-misconfigured-nginx-alias/\\n\"\n \"To fix it, look at the first lines of the nginx conf of the example app : \"\n \"https://github.com/YunoHost/example_ynh/blob/master/conf/nginx.conf\"\n )" } ], "deleted": [] }, "commit_link": "github.com/YunoHost/package_linter/commit/f6e98894cfe841aedaa7efd590937f0255193913", "file_name": "package_linter.py", "func_name": "misc_file_checks", "line_changes": { "added": [ { "char_end": 1520, "char_start": 1425, "line": " if not os.path.isfile(self.path + \"/conf/\" + filename) or \"nginx\" not in filename:\n", "line_no": 42 }, { "char_end": 1546, "char_start": 1545, "line": "\n", "line_no": 44 } ], "deleted": [ { "char_end": 1336, "char_start": 1268, "line": " if not os.path.isfile(self.path + \"/conf/\" + filename):\n", "line_no": 39 } ] }, "vul_type": "cwe-022" }
24
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def misc_file_checks(self):", " print_header(\"MISC FILE CHECKS\")", " #\n # Check for recommended and mandatory files\n #", " filenames = (\"manifest.json\", \"LICENSE\", \"README.md\",\n \"scripts/install\", \"scripts/remove\",\n \"...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1184, "char_start": 1153, "chars": "Analyze nginx conf\n # - " }, { "char_end": 1292, "char_start": 1240, "chars": " - Spot path traversal issue vulnerability\n #" }, { "char_end": 1437, "char_start": 1363, "chars": "# Ignore subdirs or filename not containing nginx in the name\n " }, { "char_end": 1518, "char_start": 1491, "chars": " or \"nginx\" not in filename" }, { "char_end": 1606, "char_start": 1544, "chars": "\n\n #\n # 'add_header' usage\n #" }, { "char_end": 3888, "char_start": 2089, "chars": "\n\n #\n # Path traversal issues\n #\n lines = open(self.path + \"/conf/\" + filename).readlines()\n lines = [line.strip() for line in lines if not line.strip().startswith(\"#\")]\n # Let's find the first location line\n location_line = None\n path_traversal_vulnerable = False\n lines_iter = lines.__iter__()\n for line in lines_iter:\n if line.startswith(\"location\"):\n location_line = line\n break\n # Look at the next lines for an 'alias' directive\n if location_line is not None:\n for line in lines_iter:\n if line.startswith(\"location\"):\n # Entering a new location block ... abort here\n # and assume there's no alias block later...\n break\n if line.startswith(\"alias\"):\n # We should definitely check for path traversal issue\n # Does the location target ends with / ?\n target = location_line.split()[-2]\n if not target.endswith(\"/\"):\n path_traversal_vulnerable = True\n break\n if path_traversal_vulnerable:\n print_warning(\n \"The nginx configuration appears vulnerable to path traversal as explained in \"\n \"https://www.acunetix.com/vulnerabilities/web/path-traversal-via-misconfigured-nginx-alias/\\n\"\n \"To fix it, look at the first lines of the nginx conf of the example app : \"\n \"https://github.com/YunoHost/example_ynh/blob/master/conf/nginx.conf\"\n )" } ], "deleted": [] }, "commit_link": "github.com/YunoHost/package_linter/commit/f6e98894cfe841aedaa7efd590937f0255193913", "file_name": "package_linter.py", "func_name": "misc_file_checks", "line_changes": { "added": [ { "char_end": 1520, "char_start": 1425, "line": " if not os.path.isfile(self.path + \"/conf/\" + filename) or \"nginx\" not in filename:\n", "line_no": 42 }, { "char_end": 1546, "char_start": 1545, "line": "\n", "line_no": 44 } ], "deleted": [ { "char_end": 1336, "char_start": 1268, "line": " if not os.path.isfile(self.path + \"/conf/\" + filename):\n", "line_no": 39 } ] }, "vul_type": "cwe-022" }
24
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "void dd_save_binary(struct dump_dir* dd, const char* name, const char* data, unsigned size)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n", "", " char *full_path = concat_path_file(dd->dd_dirname, name);\n save_binary_file(full_path, data, size, dd->dd_uid, ...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 310, "char_start": 183, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_save_binary", "line_changes": { "added": [ { "char_end": 219, "char_start": 179, "line": " if (!str_is_correct_filename(name))\n", "line_no": 6 }, { "char_end": 305, "char_start": 219, "line": " error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n", "line_no": 7 }, { "char_end": 306, "char_start": 305, "line": "\n", "line_no": 8 } ], "deleted": [] }, "vul_type": "cwe-022" }
25
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "void dd_save_binary(struct dump_dir* dd, const char* name, const char* data, unsigned size)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n", " if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", nam...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 310, "char_start": 183, "chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n\n " } ], "deleted": [] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/dump_dir.c", "func_name": "dd_save_binary", "line_changes": { "added": [ { "char_end": 219, "char_start": 179, "line": " if (!str_is_correct_filename(name))\n", "line_no": 6 }, { "char_end": 305, "char_start": 219, "line": " error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n", "line_no": 7 }, { "char_end": 306, "char_start": 305, "line": "\n", "line_no": 8 } ], "deleted": [] }, "vul_type": "cwe-022" }
25
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "def pascal_case(value: str) -> str:", " return stringcase.pascalcase(value)" ]
[ 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 79, "char_start": 69, "chars": "_sanitize(" }, { "char_end": 86, "char_start": 85, "chars": ")" } ], "deleted": [] }, "commit_link": "github.com/openapi-generators/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746", "file_name": "openapi_python_client/utils.py", "func_name": "pascal_case", "line_changes": { "added": [ { "char_end": 86, "char_start": 36, "line": " return stringcase.pascalcase(_sanitize(value))\n", "line_no": 2 } ], "deleted": [ { "char_end": 75, "char_start": 36, "line": " return stringcase.pascalcase(value)\n", "line_no": 2 } ] }, "vul_type": "cwe-022" }
26
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def pascal_case(value: str) -> str:", " return stringcase.pascalcase(_sanitize(value))" ]
[ 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 79, "char_start": 69, "chars": "_sanitize(" }, { "char_end": 86, "char_start": 85, "chars": ")" } ], "deleted": [] }, "commit_link": "github.com/openapi-generators/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746", "file_name": "openapi_python_client/utils.py", "func_name": "pascal_case", "line_changes": { "added": [ { "char_end": 86, "char_start": 36, "line": " return stringcase.pascalcase(_sanitize(value))\n", "line_no": 2 } ], "deleted": [ { "char_end": 75, "char_start": 36, "line": " return stringcase.pascalcase(value)\n", "line_no": 2 } ] }, "vul_type": "cwe-022" }
26
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "cleanup_pathname(struct archive_write_disk *a)\n{\n\tchar *dest, *src;\n\tchar separator = '\\0';", "\tdest = src = a->name;\n\tif (*src == '\\0') {\n\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t \"Invalid empty pathname\");\n\t\treturn (ARCHIVE_FAILED);\n\t}", "#if defined(__CYGWIN__)\n\tcle...
[ 1, 1, 1, 0, 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 543, "char_start": 353, "chars": " {\n\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t\t \"Path is absolute\");\n\t\t\treturn (ARCHIVE_FAILED);\n\t\t}\n" }, { "char_end": 568, "char_start": 565, "chars": "\n\t}" } ], "deleted": [] }, "commit_link": "github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526", "file_name": "libarchive/archive_write_disk_posix.c", "func_name": "cleanup_pathname", "line_changes": { "added": [ { "char_end": 356, "char_start": 336, "line": "\tif (*src == '/') {\n", "line_no": 17 }, { "char_end": 415, "char_start": 356, "line": "\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n", "line_no": 18 }, { "char_end": 469, "char_start": 415, "line": "\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n", "line_no": 19 }, { "char_end": 511, "char_start": 469, "line": "\t\t\t \"Path is absolute\");\n", "line_no": 20 }, { "char_end": 539, "char_start": 511, "line": "\t\t\treturn (ARCHIVE_FAILED);\n", "line_no": 21 }, { "char_end": 543, "char_start": 539, "line": "\t\t}\n", "line_no": 22 }, { "char_end": 544, "char_start": 543, "line": "\n", "line_no": 23 }, { "char_end": 569, "char_start": 566, "line": "\t}\n", "line_no": 25 } ], "deleted": [ { "char_end": 354, "char_start": 336, "line": "\tif (*src == '/')\n", "line_no": 17 } ] }, "vul_type": "cwe-022" }
27
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "cleanup_pathname(struct archive_write_disk *a)\n{\n\tchar *dest, *src;\n\tchar separator = '\\0';", "\tdest = src = a->name;\n\tif (*src == '\\0') {\n\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t \"Invalid empty pathname\");\n\t\treturn (ARCHIVE_FAILED);\n\t}", "#if defined(__CYGWIN__)\n\tcle...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 543, "char_start": 353, "chars": " {\n\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t\t \"Path is absolute\");\n\t\t\treturn (ARCHIVE_FAILED);\n\t\t}\n" }, { "char_end": 568, "char_start": 565, "chars": "\n\t}" } ], "deleted": [] }, "commit_link": "github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526", "file_name": "libarchive/archive_write_disk_posix.c", "func_name": "cleanup_pathname", "line_changes": { "added": [ { "char_end": 356, "char_start": 336, "line": "\tif (*src == '/') {\n", "line_no": 17 }, { "char_end": 415, "char_start": 356, "line": "\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n", "line_no": 18 }, { "char_end": 469, "char_start": 415, "line": "\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n", "line_no": 19 }, { "char_end": 511, "char_start": 469, "line": "\t\t\t \"Path is absolute\");\n", "line_no": 20 }, { "char_end": 539, "char_start": 511, "line": "\t\t\treturn (ARCHIVE_FAILED);\n", "line_no": 21 }, { "char_end": 543, "char_start": 539, "line": "\t\t}\n", "line_no": 22 }, { "char_end": 544, "char_start": 543, "line": "\n", "line_no": 23 }, { "char_end": 569, "char_start": 566, "line": "\t}\n", "line_no": 25 } ], "deleted": [ { "char_end": 354, "char_start": 336, "line": "\tif (*src == '/')\n", "line_no": 17 } ] }, "vul_type": "cwe-022" }
27
cwe-022
c
Determine whether the {function_name} code is vulnerable or not.
[ "struct dump_dir *create_dump_dir_from_problem_data(problem_data_t *problem_data, const char *base_dir_name)\n{\n INITIALIZE_LIBREPORT();", " char *type = problem_data_get_content_or_NULL(problem_data, FILENAME_ANALYZER);", " if (!type)\n {\n error_msg(_(\"Missing required item: '%s'\"), FILE...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 0, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 497, "char_start": 349, "chars": "if (!str_is_correct_filename(type))\n {\n error_msg(_(\"'%s' is not correct file name\"), FILENAME_ANALYZER);\n return NULL;\n }\n\n " }, { "char_end": 2558, "char_start": 2383, "chars": "!str_is_correct_filename(name))\n {\n error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);\n continue;\n }\n\n if (" } ], "deleted": [ { "char_end": 2963, "char_start": 2709, "chars": "\n continue;\n }\n\n /* only files should contain '/' and those are handled earlier */\n if (name[0] == '.' || strchr(name, '/'))\n {\n error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);" } ] }, "commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277", "file_name": "src/lib/create_dump_dir.c", "func_name": "create_dump_dir_from_problem_data", "line_changes": { "added": [ { "char_end": 385, "char_start": 345, "line": " if (!str_is_correct_filename(type))\n", "line_no": 13 }, { "char_end": 391, "char_start": 385, "line": " {\n", "line_no": 14 }, { "char_end": 465, "char_start": 391, "line": " error_msg(_(\"'%s' is not correct file name\"), FILENAME_ANALYZER);\n", "line_no": 15 }, { "char_end": 486, "char_start": 465, "line": " return NULL;\n", "line_no": 16 }, { "char_end": 492, "char_start": 486, "line": " }\n", "line_no": 17 }, { "char_end": 493, "char_start": 492, "line": "\n", "line_no": 18 }, { "char_end": 2415, "char_start": 2371, "line": " if (!str_is_correct_filename(name))\n", "line_no": 82 }, { "char_end": 2425, "char_start": 2415, "line": " {\n", "line_no": 83 }, { "char_end": 2513, "char_start": 2425, "line": " error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);\n", "line_no": 84 }, { "char_end": 2535, "char_start": 2513, "line": " continue;\n", "line_no": 85 }, { "char_end": 2545, "char_start": 2535, "line": " }\n", "line_no": 86 }, { "char_end": 2546, "char_start": 2545, "line": "\n", "line_no": 87 } ], "deleted": [ { "char_end": 2817, "char_start": 2743, "line": " /* only files should contain '/' and those are handled earlier */\n", "line_no": 90 }, { "char_end": 2866, "char_start": 2817, "line": " if (name[0] == '.' || strchr(name, '/'))\n", "line_no": 91 }, { "char_end": 2876, "char_start": 2866, "line": " {\n", "line_no": 92 }, { "char_end": 2964, "char_start": 2876, "line": " error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);\n", "line_no": 93 }, { "char_end": 2986, "char_start": 2964, "line": " continue;\n", "line_no": 94 }, { "char_end": 2996, "char_start": 2986, "line": " }\n", "line_no": 95 }, { "char_end": 2997, "char_start": 2996, "line": "\n", "line_no": 96 } ] }, "vul_type": "cwe-022" }
28
cwe-022
c
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
7