prompt stringclasses 1 value | completions listlengths 2 1.33k | labels listlengths 2 1.33k | source stringclasses 1 value | other_info dict | index int64 0 719 | cwe stringclasses 9 values | language stringclasses 6 values |
|---|---|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"long dd_get_item_size(struct dump_dir *dd, const char *name)\n{",
"",
" long size = -1;\n char *iname = concat_path_file(dd->dd_dirname, name);\n struct stat statbuf;",
" if (lstat(iname, &statbuf) == 0 && S_ISREG(statbuf.st_mode))\n size = statbuf.st_size;\n else\n {\n if (er... | [
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 196,
"char_start": 67,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_get_item_size",
"line_changes": {
"added": [
{
"char_end": 103,
"char_start": 63,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 3
},
{
"char_end": 191,
"char_start": 103,
"line": " error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n",
"line_no": 4
},
{
"char_end": 192,
"char_start": 191,
"line": "\n",
"line_no": 5
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 0 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"long dd_get_item_size(struct dump_dir *dd, const char *name)\n{",
" if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n",
" long size = -1;\n char *iname = concat_path_file(dd->dd_dirname, name);\n struct stat statbuf;",
... | [
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 196,
"char_start": 67,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_get_item_size",
"line_changes": {
"added": [
{
"char_end": 103,
"char_start": 63,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 3
},
{
"char_end": 191,
"char_start": 103,
"line": " error_msg_and_die(\"Cannot get item size. '%s' is not a valid file name\", name);\n",
"line_no": 4
},
{
"char_end": 192,
"char_start": 191,
"line": "\n",
"line_no": 5
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 0 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def zmi_page_request(self, *args, **kwargs):\r\n request = self.REQUEST\r\n RESPONSE = request.RESPONSE\r\n SESSION = request.SESSION\r\n self._zmi_page_request()\r\n RESPONSE.setHeader('Expires',DateTime(request['ZMI_TIME']-10000).toZone('GMT+1').rfc822())\r\n RESPONSE.setHeader('Cac... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1363,
"char_start": 1322,
"chars": "self.getDocumentElement().id in path and "
}
],
"deleted": []
},
"commit_link": "github.com/zms-publishing/zms4/commit/3f28620d475220dfdb06f79787158ac50727c61a",
"file_name": "ZMSItem.py",
"func_name": "zmi_page_request",
"line_changes": {
"added": [
{
"char_end": 1436,
"char_start": 1313,
"line": " if self.getDocumentElement().id in path and len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n",
"line_no": 26
}
],
"deleted": [
{
"char_end": 1395,
"char_start": 1313,
"line": " if len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n",
"line_no": 26
}
]
},
"vul_type": "cwe-022"
} | 1 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def zmi_page_request(self, *args, **kwargs):\r\n request = self.REQUEST\r\n RESPONSE = request.RESPONSE\r\n SESSION = request.SESSION\r\n self._zmi_page_request()\r\n RESPONSE.setHeader('Expires',DateTime(request['ZMI_TIME']-10000).toZone('GMT+1').rfc822())\r\n RESPONSE.setHeader('Cac... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1363,
"char_start": 1322,
"chars": "self.getDocumentElement().id in path and "
}
],
"deleted": []
},
"commit_link": "github.com/zms-publishing/zms4/commit/3f28620d475220dfdb06f79787158ac50727c61a",
"file_name": "ZMSItem.py",
"func_name": "zmi_page_request",
"line_changes": {
"added": [
{
"char_end": 1436,
"char_start": 1313,
"line": " if self.getDocumentElement().id in path and len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n",
"line_no": 26
}
],
"deleted": [
{
"char_end": 1395,
"char_start": 1313,
"line": " if len(filter(lambda x:x.find('.')>0 or x.startswith('manage_'),path))==0:\r\n",
"line_no": 26
}
]
},
"vul_type": "cwe-022"
} | 1 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"static int nntp_hcache_namer(const char *path, char *dest, size_t destlen)\n{",
" return snprintf(dest, destlen, \"%s.hcache\", path);",
"}"
] | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 81,
"char_start": 79,
"chars": "in"
},
{
"char_end": 85,
"char_start": 82,
"chars": " co"
},
{
"char_end": 90,
"char_start": 87,
"chars": "t ="
},
{
"char_end": 387,
"char_start": 133,
"chars": ";\n\n /* Strip out any directories in the path */\n char *first = strchr(dest, '/');\n char *last = strrchr(dest, '/');\n if (first && last && (last > first))\n {\n memmove(first, last, strlen(last) + 1);\n count -= (last - first);\n }\n\n return count"
}
],
"deleted": [
{
"char_end": 81,
"char_start": 79,
"chars": "re"
},
{
"char_end": 84,
"char_start": 83,
"chars": "r"
}
]
},
"commit_link": "github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e",
"file_name": "newsrc.c",
"func_name": "nntp_hcache_namer",
"line_changes": {
"added": [
{
"char_end": 135,
"char_start": 77,
"line": " int count = snprintf(dest, destlen, \"%s.hcache\", path);\n",
"line_no": 3
},
{
"char_end": 136,
"char_start": 135,
"line": "\n",
"line_no": 4
},
{
"char_end": 182,
"char_start": 136,
"line": " /* Strip out any directories in the path */\n",
"line_no": 5
},
{
"char_end": 217,
"char_start": 182,
"line": " char *first = strchr(dest, '/');\n",
"line_no": 6
},
{
"char_end": 252,
"char_start": 217,
"line": " char *last = strrchr(dest, '/');\n",
"line_no": 7
},
{
"char_end": 291,
"char_start": 252,
"line": " if (first && last && (last > first))\n",
"line_no": 8
},
{
"char_end": 295,
"char_start": 291,
"line": " {\n",
"line_no": 9
},
{
"char_end": 339,
"char_start": 295,
"line": " memmove(first, last, strlen(last) + 1);\n",
"line_no": 10
},
{
"char_end": 368,
"char_start": 339,
"line": " count -= (last - first);\n",
"line_no": 11
},
{
"char_end": 372,
"char_start": 368,
"line": " }\n",
"line_no": 12
},
{
"char_end": 373,
"char_start": 372,
"line": "\n",
"line_no": 13
},
{
"char_end": 389,
"char_start": 373,
"line": " return count;\n",
"line_no": 14
}
],
"deleted": [
{
"char_end": 130,
"char_start": 77,
"line": " return snprintf(dest, destlen, \"%s.hcache\", path);\n",
"line_no": 3
}
]
},
"vul_type": "cwe-022"
} | 2 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int nntp_hcache_namer(const char *path, char *dest, size_t destlen)\n{",
" int count = snprintf(dest, destlen, \"%s.hcache\", path);",
" /* Strip out any directories in the path */\n char *first = strchr(dest, '/');\n char *last = strrchr(dest, '/');\n if (first && last && (last > first))\n {\n ... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 81,
"char_start": 79,
"chars": "in"
},
{
"char_end": 85,
"char_start": 82,
"chars": " co"
},
{
"char_end": 90,
"char_start": 87,
"chars": "t ="
},
{
"char_end": 387,
"char_start": 133,
"chars": ";\n\n /* Strip out any directories in the path */\n char *first = strchr(dest, '/');\n char *last = strrchr(dest, '/');\n if (first && last && (last > first))\n {\n memmove(first, last, strlen(last) + 1);\n count -= (last - first);\n }\n\n return count"
}
],
"deleted": [
{
"char_end": 81,
"char_start": 79,
"chars": "re"
},
{
"char_end": 84,
"char_start": 83,
"chars": "r"
}
]
},
"commit_link": "github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e",
"file_name": "newsrc.c",
"func_name": "nntp_hcache_namer",
"line_changes": {
"added": [
{
"char_end": 135,
"char_start": 77,
"line": " int count = snprintf(dest, destlen, \"%s.hcache\", path);\n",
"line_no": 3
},
{
"char_end": 136,
"char_start": 135,
"line": "\n",
"line_no": 4
},
{
"char_end": 182,
"char_start": 136,
"line": " /* Strip out any directories in the path */\n",
"line_no": 5
},
{
"char_end": 217,
"char_start": 182,
"line": " char *first = strchr(dest, '/');\n",
"line_no": 6
},
{
"char_end": 252,
"char_start": 217,
"line": " char *last = strrchr(dest, '/');\n",
"line_no": 7
},
{
"char_end": 291,
"char_start": 252,
"line": " if (first && last && (last > first))\n",
"line_no": 8
},
{
"char_end": 295,
"char_start": 291,
"line": " {\n",
"line_no": 9
},
{
"char_end": 339,
"char_start": 295,
"line": " memmove(first, last, strlen(last) + 1);\n",
"line_no": 10
},
{
"char_end": 368,
"char_start": 339,
"line": " count -= (last - first);\n",
"line_no": 11
},
{
"char_end": 372,
"char_start": 368,
"line": " }\n",
"line_no": 12
},
{
"char_end": 373,
"char_start": 372,
"line": "\n",
"line_no": 13
},
{
"char_end": 389,
"char_start": 373,
"line": " return count;\n",
"line_no": 14
}
],
"deleted": [
{
"char_end": 130,
"char_start": 77,
"line": " return snprintf(dest, destlen, \"%s.hcache\", path);\n",
"line_no": 3
}
]
},
"vul_type": "cwe-022"
} | 2 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"std::string TarFileReader::extract(const string &_path) {\n if (_path.empty()) THROW(\"path cannot be empty\");\n if (!hasMore()) THROW(\"No more tar files\");",
" string path = _path;",
" if (SystemUtilities::isDirectory(path)) path += \"/\" + getFilename();",
"\n LOG_DEBUG(5, \"Extracting: \" << path)... | [
1,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 228,
"char_start": 222,
"chars": "{\n "
},
{
"char_end": 544,
"char_start": 260,
"chars": " // Check that path is under the target directory\n string a = SystemUtilities::getCanonicalPath(_path);\n string b = SystemUtilities::getCanonicalPath(path);\n if (!String::startsWith(b, a))\n THROW(\"Tar path points outside of the extraction directory: \" << path);\n }\n\n "
},
{
"char_end": 652,
"char_start": 585,
"chars": "switch (getType()) {\n case NORMAL_FILE: case CONTIGUOUS_FILE:\n "
},
{
"char_end": 851,
"char_start": 696,
"chars": ");\n case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n default: THROW(\"Unsupported tar file type \" << getType());\n }\n\n return getFilename("
}
],
"deleted": []
},
"commit_link": "github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7",
"file_name": "src/cbang/tar/TarFileReader.cpp",
"func_name": "TarFileReader::extract",
"line_changes": {
"added": [
{
"char_end": 224,
"char_start": 180,
"line": " if (SystemUtilities::isDirectory(path)) {\n",
"line_no": 6
},
{
"char_end": 257,
"char_start": 224,
"line": " path += \"/\" + getFilename();\n",
"line_no": 7
},
{
"char_end": 258,
"char_start": 257,
"line": "\n",
"line_no": 8
},
{
"char_end": 368,
"char_start": 311,
"line": " string a = SystemUtilities::getCanonicalPath(_path);\n",
"line_no": 10
},
{
"char_end": 424,
"char_start": 368,
"line": " string b = SystemUtilities::getCanonicalPath(path);\n",
"line_no": 11
},
{
"char_end": 459,
"char_start": 424,
"line": " if (!String::startsWith(b, a))\n",
"line_no": 12
},
{
"char_end": 537,
"char_start": 459,
"line": " THROW(\"Tar path points outside of the extraction directory: \" << path);\n",
"line_no": 13
},
{
"char_end": 541,
"char_start": 537,
"line": " }\n",
"line_no": 14
},
{
"char_end": 606,
"char_start": 583,
"line": " switch (getType()) {\n",
"line_no": 18
},
{
"char_end": 648,
"char_start": 606,
"line": " case NORMAL_FILE: case CONTIGUOUS_FILE:\n",
"line_no": 19
},
{
"char_end": 699,
"char_start": 648,
"line": " return extract(*SystemUtilities::oopen(path));\n",
"line_no": 20
},
{
"char_end": 764,
"char_start": 699,
"line": " case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n",
"line_no": 21
},
{
"char_end": 825,
"char_start": 764,
"line": " default: THROW(\"Unsupported tar file type \" << getType());\n",
"line_no": 22
},
{
"char_end": 829,
"char_start": 825,
"line": " }\n",
"line_no": 23
},
{
"char_end": 830,
"char_start": 829,
"line": "\n",
"line_no": 24
},
{
"char_end": 854,
"char_start": 830,
"line": " return getFilename();\n",
"line_no": 25
}
],
"deleted": [
{
"char_end": 251,
"char_start": 180,
"line": " if (SystemUtilities::isDirectory(path)) path += \"/\" + getFilename();\n",
"line_no": 6
},
{
"char_end": 342,
"char_start": 293,
"line": " return extract(*SystemUtilities::oopen(path));\n",
"line_no": 10
}
]
},
"vul_type": "cwe-022"
} | 3 | cwe-022 | cpp |
Determine whether the {function_name} code is vulnerable or not. | [
"std::string TarFileReader::extract(const string &_path) {\n if (_path.empty()) THROW(\"path cannot be empty\");\n if (!hasMore()) THROW(\"No more tar files\");",
" string path = _path;",
" if (SystemUtilities::isDirectory(path)) {\n path += \"/\" + getFilename();",
" // Check that path is under the... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 228,
"char_start": 222,
"chars": "{\n "
},
{
"char_end": 544,
"char_start": 260,
"chars": " // Check that path is under the target directory\n string a = SystemUtilities::getCanonicalPath(_path);\n string b = SystemUtilities::getCanonicalPath(path);\n if (!String::startsWith(b, a))\n THROW(\"Tar path points outside of the extraction directory: \" << path);\n }\n\n "
},
{
"char_end": 652,
"char_start": 585,
"chars": "switch (getType()) {\n case NORMAL_FILE: case CONTIGUOUS_FILE:\n "
},
{
"char_end": 851,
"char_start": 696,
"chars": ");\n case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n default: THROW(\"Unsupported tar file type \" << getType());\n }\n\n return getFilename("
}
],
"deleted": []
},
"commit_link": "github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7",
"file_name": "src/cbang/tar/TarFileReader.cpp",
"func_name": "TarFileReader::extract",
"line_changes": {
"added": [
{
"char_end": 224,
"char_start": 180,
"line": " if (SystemUtilities::isDirectory(path)) {\n",
"line_no": 6
},
{
"char_end": 257,
"char_start": 224,
"line": " path += \"/\" + getFilename();\n",
"line_no": 7
},
{
"char_end": 258,
"char_start": 257,
"line": "\n",
"line_no": 8
},
{
"char_end": 368,
"char_start": 311,
"line": " string a = SystemUtilities::getCanonicalPath(_path);\n",
"line_no": 10
},
{
"char_end": 424,
"char_start": 368,
"line": " string b = SystemUtilities::getCanonicalPath(path);\n",
"line_no": 11
},
{
"char_end": 459,
"char_start": 424,
"line": " if (!String::startsWith(b, a))\n",
"line_no": 12
},
{
"char_end": 537,
"char_start": 459,
"line": " THROW(\"Tar path points outside of the extraction directory: \" << path);\n",
"line_no": 13
},
{
"char_end": 541,
"char_start": 537,
"line": " }\n",
"line_no": 14
},
{
"char_end": 606,
"char_start": 583,
"line": " switch (getType()) {\n",
"line_no": 18
},
{
"char_end": 648,
"char_start": 606,
"line": " case NORMAL_FILE: case CONTIGUOUS_FILE:\n",
"line_no": 19
},
{
"char_end": 699,
"char_start": 648,
"line": " return extract(*SystemUtilities::oopen(path));\n",
"line_no": 20
},
{
"char_end": 764,
"char_start": 699,
"line": " case DIRECTORY: SystemUtilities::ensureDirectory(path); break;\n",
"line_no": 21
},
{
"char_end": 825,
"char_start": 764,
"line": " default: THROW(\"Unsupported tar file type \" << getType());\n",
"line_no": 22
},
{
"char_end": 829,
"char_start": 825,
"line": " }\n",
"line_no": 23
},
{
"char_end": 830,
"char_start": 829,
"line": "\n",
"line_no": 24
},
{
"char_end": 854,
"char_start": 830,
"line": " return getFilename();\n",
"line_no": 25
}
],
"deleted": [
{
"char_end": 251,
"char_start": 180,
"line": " if (SystemUtilities::isDirectory(path)) path += \"/\" + getFilename();\n",
"line_no": 6
},
{
"char_end": 342,
"char_start": 293,
"line": " return extract(*SystemUtilities::oopen(path));\n",
"line_no": 10
}
]
},
"vul_type": "cwe-022"
} | 3 | cwe-022 | cpp |
Determine whether the {function_name} code is vulnerable or not. | [
"static void handle_method_call(GDBusConnection *connection,\n const gchar *caller,\n const gchar *object_path,\n const gchar *interface_name,\n const gchar *method_name,\n GVariant *parameters,\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | SVEN | {
"char_changes": {
"added": [
{
"char_end": 9241,
"char_start": 9086,
"chars": "allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }\n\n if (!"
},
{
"char_end": 11867,
"char_start": 11712,
"chars": "\n\n if (!allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }"
},
{
"char_end": 16546,
"char_start": 16068,
"chars": "\n\n if (!str_is_correct_filename(element))\n {\n log_notice(\"'%s' is not a valid element name\", element);\n char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n g_dbus_method_invocation_return_dbus_error(invocation,\n \"org.freedesktop.problems.InvalidElement\",\n error);\n\n free(error);\n return;\n }"
}
],
"deleted": []
},
"commit_link": "github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3",
"file_name": "src/dbus/abrt-dbus.c",
"func_name": "handle_method_call",
"line_changes": {
"added": [
{
"char_end": 9119,
"char_start": 9073,
"line": " if (!allowed_problem_dir(problem_id))\n",
"line_no": 259
},
{
"char_end": 9129,
"char_start": 9119,
"line": " {\n",
"line_no": 260
},
{
"char_end": 9197,
"char_start": 9129,
"line": " return_InvalidProblemDir_error(invocation, problem_id);\n",
"line_no": 261
},
{
"char_end": 9217,
"char_start": 9197,
"line": " return;\n",
"line_no": 262
},
{
"char_end": 9227,
"char_start": 9217,
"line": " }\n",
"line_no": 263
},
{
"char_end": 9228,
"char_start": 9227,
"line": "\n",
"line_no": 264
},
{
"char_end": 11760,
"char_start": 11714,
"line": " if (!allowed_problem_dir(problem_id))\n",
"line_no": 324
},
{
"char_end": 11770,
"char_start": 11760,
"line": " {\n",
"line_no": 325
},
{
"char_end": 11838,
"char_start": 11770,
"line": " return_InvalidProblemDir_error(invocation, problem_id);\n",
"line_no": 326
},
{
"char_end": 11858,
"char_start": 11838,
"line": " return;\n",
"line_no": 327
},
{
"char_end": 11868,
"char_start": 11858,
"line": " }\n",
"line_no": 328
},
{
"char_end": 11869,
"char_start": 11868,
"line": "\n",
"line_no": 329
},
{
"char_end": 16117,
"char_start": 16070,
"line": " if (!str_is_correct_filename(element))\n",
"line_no": 447
},
{
"char_end": 16127,
"char_start": 16117,
"line": " {\n",
"line_no": 448
},
{
"char_end": 16196,
"char_start": 16127,
"line": " log_notice(\"'%s' is not a valid element name\", element);\n",
"line_no": 449
},
{
"char_end": 16281,
"char_start": 16196,
"line": " char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n",
"line_no": 450
},
{
"char_end": 16348,
"char_start": 16281,
"line": " g_dbus_method_invocation_return_dbus_error(invocation,\n",
"line_no": 451
},
{
"char_end": 16437,
"char_start": 16348,
"line": " \"org.freedesktop.problems.InvalidElement\",\n",
"line_no": 452
},
{
"char_end": 16491,
"char_start": 16437,
"line": " error);\n",
"line_no": 453
},
{
"char_end": 16492,
"char_start": 16491,
"line": "\n",
"line_no": 454
},
{
"char_end": 16517,
"char_start": 16492,
"line": " free(error);\n",
"line_no": 455
},
{
"char_end": 16537,
"char_start": 16517,
"line": " return;\n",
"line_no": 456
},
{
"char_end": 16547,
"char_start": 16537,
"line": " }\n",
"line_no": 457
},
{
"char_end": 16548,
"char_start": 16547,
"line": "\n",
"line_no": 458
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 4 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static void handle_method_call(GDBusConnection *connection,\n const gchar *caller,\n const gchar *object_path,\n const gchar *interface_name,\n const gchar *method_name,\n GVariant *parameters,\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | SVEN | {
"char_changes": {
"added": [
{
"char_end": 9241,
"char_start": 9086,
"chars": "allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }\n\n if (!"
},
{
"char_end": 11867,
"char_start": 11712,
"chars": "\n\n if (!allowed_problem_dir(problem_id))\n {\n return_InvalidProblemDir_error(invocation, problem_id);\n return;\n }"
},
{
"char_end": 16546,
"char_start": 16068,
"chars": "\n\n if (!str_is_correct_filename(element))\n {\n log_notice(\"'%s' is not a valid element name\", element);\n char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n g_dbus_method_invocation_return_dbus_error(invocation,\n \"org.freedesktop.problems.InvalidElement\",\n error);\n\n free(error);\n return;\n }"
}
],
"deleted": []
},
"commit_link": "github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3",
"file_name": "src/dbus/abrt-dbus.c",
"func_name": "handle_method_call",
"line_changes": {
"added": [
{
"char_end": 9119,
"char_start": 9073,
"line": " if (!allowed_problem_dir(problem_id))\n",
"line_no": 259
},
{
"char_end": 9129,
"char_start": 9119,
"line": " {\n",
"line_no": 260
},
{
"char_end": 9197,
"char_start": 9129,
"line": " return_InvalidProblemDir_error(invocation, problem_id);\n",
"line_no": 261
},
{
"char_end": 9217,
"char_start": 9197,
"line": " return;\n",
"line_no": 262
},
{
"char_end": 9227,
"char_start": 9217,
"line": " }\n",
"line_no": 263
},
{
"char_end": 9228,
"char_start": 9227,
"line": "\n",
"line_no": 264
},
{
"char_end": 11760,
"char_start": 11714,
"line": " if (!allowed_problem_dir(problem_id))\n",
"line_no": 324
},
{
"char_end": 11770,
"char_start": 11760,
"line": " {\n",
"line_no": 325
},
{
"char_end": 11838,
"char_start": 11770,
"line": " return_InvalidProblemDir_error(invocation, problem_id);\n",
"line_no": 326
},
{
"char_end": 11858,
"char_start": 11838,
"line": " return;\n",
"line_no": 327
},
{
"char_end": 11868,
"char_start": 11858,
"line": " }\n",
"line_no": 328
},
{
"char_end": 11869,
"char_start": 11868,
"line": "\n",
"line_no": 329
},
{
"char_end": 16117,
"char_start": 16070,
"line": " if (!str_is_correct_filename(element))\n",
"line_no": 447
},
{
"char_end": 16127,
"char_start": 16117,
"line": " {\n",
"line_no": 448
},
{
"char_end": 16196,
"char_start": 16127,
"line": " log_notice(\"'%s' is not a valid element name\", element);\n",
"line_no": 449
},
{
"char_end": 16281,
"char_start": 16196,
"line": " char *error = xasprintf(_(\"'%s' is not a valid element name\"), element);\n",
"line_no": 450
},
{
"char_end": 16348,
"char_start": 16281,
"line": " g_dbus_method_invocation_return_dbus_error(invocation,\n",
"line_no": 451
},
{
"char_end": 16437,
"char_start": 16348,
"line": " \"org.freedesktop.problems.InvalidElement\",\n",
"line_no": 452
},
{
"char_end": 16491,
"char_start": 16437,
"line": " error);\n",
"line_no": 453
},
{
"char_end": 16492,
"char_start": 16491,
"line": "\n",
"line_no": 454
},
{
"char_end": 16517,
"char_start": 16492,
"line": " free(error);\n",
"line_no": 455
},
{
"char_end": 16537,
"char_start": 16517,
"line": " return;\n",
"line_no": 456
},
{
"char_end": 16547,
"char_start": 16537,
"line": " }\n",
"line_no": 457
},
{
"char_end": 16548,
"char_start": 16547,
"line": "\n",
"line_no": 458
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 4 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def _inject_file_into_fs(fs, path, contents):\n absolute_path = os.path.join(fs, path.lstrip('/'))",
" parent_dir = os.path.dirname(absolute_path)\n utils.execute('mkdir', '-p', parent_dir, run_as_root=True)",
" utils.execute('tee', absolute_path, process_input=contents,\n run_as_root=True... | [
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 57,
"char_start": 43,
"chars": ", append=False"
},
{
"char_end": 82,
"char_start": 80,
"chars": "_j"
},
{
"char_end": 96,
"char_start": 83,
"chars": "in_and_check_"
},
{
"char_end": 105,
"char_start": 100,
"chars": "_with"
},
{
"char_end": 110,
"char_start": 107,
"chars": "_fs"
},
{
"char_end": 134,
"char_start": 133,
"chars": "\n"
},
{
"char_end": 246,
"char_start": 245,
"chars": "\n"
},
{
"char_end": 264,
"char_start": 250,
"chars": "args = []\n "
},
{
"char_end": 286,
"char_start": 265,
"chars": "f append:\n arg"
},
{
"char_end": 291,
"char_start": 288,
"chars": "app"
},
{
"char_end": 294,
"char_start": 292,
"chars": "nd"
},
{
"char_end": 298,
"char_start": 296,
"chars": "-a"
},
{
"char_end": 304,
"char_start": 299,
"chars": ")\n "
},
{
"char_end": 318,
"char_start": 306,
"chars": "rgs.append(a"
},
{
"char_end": 333,
"char_start": 330,
"chars": ")\n\n"
},
{
"char_end": 351,
"char_start": 334,
"chars": " kwargs = dict("
},
{
"char_end": 435,
"char_start": 392,
"chars": "\n\n utils.execute('tee', *args, **kwargs)"
}
],
"deleted": [
{
"char_end": 69,
"char_start": 67,
"chars": "s."
},
{
"char_end": 76,
"char_start": 73,
"chars": ".jo"
},
{
"char_end": 218,
"char_start": 216,
"chars": "ut"
},
{
"char_end": 220,
"char_start": 219,
"chars": "l"
},
{
"char_end": 224,
"char_start": 222,
"chars": "ex"
},
{
"char_end": 229,
"char_start": 225,
"chars": "cute"
},
{
"char_end": 234,
"char_start": 231,
"chars": "tee"
},
{
"char_end": 236,
"char_start": 235,
"chars": ","
},
{
"char_end": 251,
"char_start": 250,
"chars": ","
},
{
"char_end": 285,
"char_start": 275,
"chars": "\n "
}
]
},
"commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7",
"file_name": "nova/virt/disk/api.py",
"func_name": "_inject_file_into_fs",
"line_changes": {
"added": [
{
"char_end": 60,
"char_start": 0,
"line": "def _inject_file_into_fs(fs, path, contents, append=False):\n",
"line_no": 1
},
{
"char_end": 133,
"char_start": 60,
"line": " absolute_path = _join_and_check_path_within_fs(fs, path.lstrip('/'))\n",
"line_no": 2
},
{
"char_end": 134,
"char_start": 133,
"line": "\n",
"line_no": 3
},
{
"char_end": 246,
"char_start": 245,
"line": "\n",
"line_no": 6
},
{
"char_end": 260,
"char_start": 246,
"line": " args = []\n",
"line_no": 7
},
{
"char_end": 275,
"char_start": 260,
"line": " if append:\n",
"line_no": 8
},
{
"char_end": 301,
"char_start": 275,
"line": " args.append('-a')\n",
"line_no": 9
},
{
"char_end": 332,
"char_start": 301,
"line": " args.append(absolute_path)\n",
"line_no": 10
},
{
"char_end": 333,
"char_start": 332,
"line": "\n",
"line_no": 11
},
{
"char_end": 393,
"char_start": 333,
"line": " kwargs = dict(process_input=contents, run_as_root=True)\n",
"line_no": 12
},
{
"char_end": 394,
"char_start": 393,
"line": "\n",
"line_no": 13
},
{
"char_end": 435,
"char_start": 394,
"line": " utils.execute('tee', *args, **kwargs)\n",
"line_no": 14
}
],
"deleted": [
{
"char_end": 276,
"char_start": 212,
"line": " utils.execute('tee', absolute_path, process_input=contents,\n",
"line_no": 5
},
{
"char_end": 303,
"char_start": 276,
"line": " run_as_root=True)\n",
"line_no": 6
}
]
},
"vul_type": "cwe-022"
} | 5 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _inject_file_into_fs(fs, path, contents, append=False):\n absolute_path = _join_and_check_path_within_fs(fs, path.lstrip('/'))\n",
" parent_dir = os.path.dirname(absolute_path)\n utils.execute('mkdir', '-p', parent_dir, run_as_root=True)",
"\n args = []\n if append:\n args.append('-a'... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 57,
"char_start": 43,
"chars": ", append=False"
},
{
"char_end": 82,
"char_start": 80,
"chars": "_j"
},
{
"char_end": 96,
"char_start": 83,
"chars": "in_and_check_"
},
{
"char_end": 105,
"char_start": 100,
"chars": "_with"
},
{
"char_end": 110,
"char_start": 107,
"chars": "_fs"
},
{
"char_end": 134,
"char_start": 133,
"chars": "\n"
},
{
"char_end": 246,
"char_start": 245,
"chars": "\n"
},
{
"char_end": 264,
"char_start": 250,
"chars": "args = []\n "
},
{
"char_end": 286,
"char_start": 265,
"chars": "f append:\n arg"
},
{
"char_end": 291,
"char_start": 288,
"chars": "app"
},
{
"char_end": 294,
"char_start": 292,
"chars": "nd"
},
{
"char_end": 298,
"char_start": 296,
"chars": "-a"
},
{
"char_end": 304,
"char_start": 299,
"chars": ")\n "
},
{
"char_end": 318,
"char_start": 306,
"chars": "rgs.append(a"
},
{
"char_end": 333,
"char_start": 330,
"chars": ")\n\n"
},
{
"char_end": 351,
"char_start": 334,
"chars": " kwargs = dict("
},
{
"char_end": 435,
"char_start": 392,
"chars": "\n\n utils.execute('tee', *args, **kwargs)"
}
],
"deleted": [
{
"char_end": 69,
"char_start": 67,
"chars": "s."
},
{
"char_end": 76,
"char_start": 73,
"chars": ".jo"
},
{
"char_end": 218,
"char_start": 216,
"chars": "ut"
},
{
"char_end": 220,
"char_start": 219,
"chars": "l"
},
{
"char_end": 224,
"char_start": 222,
"chars": "ex"
},
{
"char_end": 229,
"char_start": 225,
"chars": "cute"
},
{
"char_end": 234,
"char_start": 231,
"chars": "tee"
},
{
"char_end": 236,
"char_start": 235,
"chars": ","
},
{
"char_end": 251,
"char_start": 250,
"chars": ","
},
{
"char_end": 285,
"char_start": 275,
"chars": "\n "
}
]
},
"commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7",
"file_name": "nova/virt/disk/api.py",
"func_name": "_inject_file_into_fs",
"line_changes": {
"added": [
{
"char_end": 60,
"char_start": 0,
"line": "def _inject_file_into_fs(fs, path, contents, append=False):\n",
"line_no": 1
},
{
"char_end": 133,
"char_start": 60,
"line": " absolute_path = _join_and_check_path_within_fs(fs, path.lstrip('/'))\n",
"line_no": 2
},
{
"char_end": 134,
"char_start": 133,
"line": "\n",
"line_no": 3
},
{
"char_end": 246,
"char_start": 245,
"line": "\n",
"line_no": 6
},
{
"char_end": 260,
"char_start": 246,
"line": " args = []\n",
"line_no": 7
},
{
"char_end": 275,
"char_start": 260,
"line": " if append:\n",
"line_no": 8
},
{
"char_end": 301,
"char_start": 275,
"line": " args.append('-a')\n",
"line_no": 9
},
{
"char_end": 332,
"char_start": 301,
"line": " args.append(absolute_path)\n",
"line_no": 10
},
{
"char_end": 333,
"char_start": 332,
"line": "\n",
"line_no": 11
},
{
"char_end": 393,
"char_start": 333,
"line": " kwargs = dict(process_input=contents, run_as_root=True)\n",
"line_no": 12
},
{
"char_end": 394,
"char_start": 393,
"line": "\n",
"line_no": 13
},
{
"char_end": 435,
"char_start": 394,
"line": " utils.execute('tee', *args, **kwargs)\n",
"line_no": 14
}
],
"deleted": [
{
"char_end": 276,
"char_start": 212,
"line": " utils.execute('tee', absolute_path, process_input=contents,\n",
"line_no": 5
},
{
"char_end": 303,
"char_start": 276,
"line": " run_as_root=True)\n",
"line_no": 6
}
]
},
"vul_type": "cwe-022"
} | 5 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"set_interface_var(const char *iface,\n\t\t const char *var, const char *name,\n\t\t uint32_t val)\n{\n\tFILE *fp;\n\tchar spath[64+IFNAMSIZ];\t/* XXX: magic constant */\n\tif (snprintf(spath, sizeof(spath), var, iface) >= sizeof(spath))",
"",
"\t\treturn -1;",
"\tif (access(spath, F_OK) != 0)\n\t\treturn -... | [
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 325,
"char_start": 240,
"chars": "/* No path traversal */\n\tif (strstr(name, \"..\") || strchr(name, '/'))\n\t\treturn -1;\n\n\t"
}
],
"deleted": []
},
"commit_link": "github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc",
"file_name": "device-linux.c",
"func_name": "set_interface_var",
"line_changes": {
"added": [
{
"char_end": 264,
"char_start": 239,
"line": "\t/* No path traversal */\n",
"line_no": 10
},
{
"char_end": 310,
"char_start": 264,
"line": "\tif (strstr(name, \"..\") || strchr(name, '/'))\n",
"line_no": 11
},
{
"char_end": 323,
"char_start": 310,
"line": "\t\treturn -1;\n",
"line_no": 12
},
{
"char_end": 324,
"char_start": 323,
"line": "\n",
"line_no": 13
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 6 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"set_interface_var(const char *iface,\n\t\t const char *var, const char *name,\n\t\t uint32_t val)\n{\n\tFILE *fp;\n\tchar spath[64+IFNAMSIZ];\t/* XXX: magic constant */\n\tif (snprintf(spath, sizeof(spath), var, iface) >= sizeof(spath))",
"\t\treturn -1;",
"\t/* No path traversal */\n\tif (strstr(name, \"..\... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 325,
"char_start": 240,
"chars": "/* No path traversal */\n\tif (strstr(name, \"..\") || strchr(name, '/'))\n\t\treturn -1;\n\n\t"
}
],
"deleted": []
},
"commit_link": "github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc",
"file_name": "device-linux.c",
"func_name": "set_interface_var",
"line_changes": {
"added": [
{
"char_end": 264,
"char_start": 239,
"line": "\t/* No path traversal */\n",
"line_no": 10
},
{
"char_end": 310,
"char_start": 264,
"line": "\tif (strstr(name, \"..\") || strchr(name, '/'))\n",
"line_no": 11
},
{
"char_end": 323,
"char_start": 310,
"line": "\t\treturn -1;\n",
"line_no": 12
},
{
"char_end": 324,
"char_start": 323,
"line": "\n",
"line_no": 13
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 6 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def cut(self, key):\n try:",
" self.etcd.delete(os.path.join(self.namespace, key))",
" except etcd.EtcdKeyNotFound:\n return False\n except etcd.EtcdException as err:\n log_error(\"Error removing key %s: [%r]\" % (key, repr(err)))\n raise CSStore... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 72,
"char_start": 71,
"chars": "_"
},
{
"char_end": 79,
"char_start": 73,
"chars": "bsolut"
},
{
"char_end": 82,
"char_start": 80,
"chars": "_k"
},
{
"char_end": 85,
"char_start": 83,
"chars": "y("
}
],
"deleted": [
{
"char_end": 79,
"char_start": 66,
"chars": "os.path.join("
},
{
"char_end": 85,
"char_start": 84,
"chars": "n"
},
{
"char_end": 88,
"char_start": 86,
"chars": "me"
},
{
"char_end": 92,
"char_start": 89,
"chars": "pac"
},
{
"char_end": 95,
"char_start": 93,
"chars": ", "
}
]
},
"commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4",
"file_name": "custodia/store/etcdstore.py",
"func_name": "cut",
"line_changes": {
"added": [
{
"char_end": 91,
"char_start": 37,
"line": " self.etcd.delete(self._absolute_key(key))\n",
"line_no": 3
}
],
"deleted": [
{
"char_end": 101,
"char_start": 37,
"line": " self.etcd.delete(os.path.join(self.namespace, key))\n",
"line_no": 3
}
]
},
"vul_type": "cwe-022"
} | 7 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def cut(self, key):\n try:",
" self.etcd.delete(self._absolute_key(key))",
" except etcd.EtcdKeyNotFound:\n return False\n except etcd.EtcdException as err:\n log_error(\"Error removing key %s: [%r]\" % (key, repr(err)))\n raise CSStoreError('Err... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 72,
"char_start": 71,
"chars": "_"
},
{
"char_end": 79,
"char_start": 73,
"chars": "bsolut"
},
{
"char_end": 82,
"char_start": 80,
"chars": "_k"
},
{
"char_end": 85,
"char_start": 83,
"chars": "y("
}
],
"deleted": [
{
"char_end": 79,
"char_start": 66,
"chars": "os.path.join("
},
{
"char_end": 85,
"char_start": 84,
"chars": "n"
},
{
"char_end": 88,
"char_start": 86,
"chars": "me"
},
{
"char_end": 92,
"char_start": 89,
"chars": "pac"
},
{
"char_end": 95,
"char_start": 93,
"chars": ", "
}
]
},
"commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4",
"file_name": "custodia/store/etcdstore.py",
"func_name": "cut",
"line_changes": {
"added": [
{
"char_end": 91,
"char_start": 37,
"line": " self.etcd.delete(self._absolute_key(key))\n",
"line_no": 3
}
],
"deleted": [
{
"char_end": 101,
"char_start": 37,
"line": " self.etcd.delete(os.path.join(self.namespace, key))\n",
"line_no": 3
}
]
},
"vul_type": "cwe-022"
} | 7 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"wiki_handle_http_request(HttpRequest *req)\n{\n HttpResponse *res = http_response_new(req);\n char *page = http_request_get_path_info(req); \n char *command = http_request_get_query_string(req); \n char *wikitext = \"\";",
" util_dehttpize(page); \t/* remove any encoding on... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1368,
"char_start": 1356,
"chars": "!page_name_i"
},
{
"char_end": 1374,
"char_start": 1369,
"chars": "_good"
}
],
"deleted": [
{
"char_end": 1362,
"char_start": 1357,
"chars": "trchr"
},
{
"char_end": 1372,
"char_start": 1367,
"chars": ", '/'"
}
]
},
"commit_link": "github.com/yarolig/didiwiki/commit/5e5c796617e1712905dc5462b94bd5e6c08d15ea",
"file_name": "src/wiki.c",
"func_name": "wiki_handle_http_request",
"line_changes": {
"added": [
{
"char_end": 1382,
"char_start": 1350,
"line": " if (!page_name_is_good(page))\n",
"line_no": 54
}
],
"deleted": [
{
"char_end": 1375,
"char_start": 1350,
"line": " if (strchr(page, '/'))\n",
"line_no": 54
}
]
},
"vul_type": "cwe-022"
} | 8 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"wiki_handle_http_request(HttpRequest *req)\n{\n HttpResponse *res = http_response_new(req);\n char *page = http_request_get_path_info(req); \n char *command = http_request_get_query_string(req); \n char *wikitext = \"\";",
" util_dehttpize(page); \t/* remove any encoding on... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1368,
"char_start": 1356,
"chars": "!page_name_i"
},
{
"char_end": 1374,
"char_start": 1369,
"chars": "_good"
}
],
"deleted": [
{
"char_end": 1362,
"char_start": 1357,
"chars": "trchr"
},
{
"char_end": 1372,
"char_start": 1367,
"chars": ", '/'"
}
]
},
"commit_link": "github.com/yarolig/didiwiki/commit/5e5c796617e1712905dc5462b94bd5e6c08d15ea",
"file_name": "src/wiki.c",
"func_name": "wiki_handle_http_request",
"line_changes": {
"added": [
{
"char_end": 1382,
"char_start": 1350,
"line": " if (!page_name_is_good(page))\n",
"line_no": 54
}
],
"deleted": [
{
"char_end": 1375,
"char_start": 1350,
"line": " if (strchr(page, '/'))\n",
"line_no": 54
}
]
},
"vul_type": "cwe-022"
} | 8 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def candidate_paths_for_url(self, url):\n for root, prefix in self.directories:\n if url.startswith(prefix):",
" yield os.path.join(root, url[len(prefix):])"
] | [
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 151,
"char_start": 145,
"chars": "path ="
},
{
"char_end": 283,
"char_start": 189,
"chars": "\n if os.path.commonprefix((root, path)) == root:\n yield path"
}
],
"deleted": [
{
"char_end": 150,
"char_start": 145,
"chars": "yield"
}
]
},
"commit_link": "github.com/evansd/whitenoise/commit/4d8a3ab1e97d7ddb18b3fa8b4909c92bad5529c6",
"file_name": "whitenoise/base.py",
"func_name": "candidate_paths_for_url",
"line_changes": {
"added": [
{
"char_end": 190,
"char_start": 129,
"line": " path = os.path.join(root, url[len(prefix):])\n",
"line_no": 4
},
{
"char_end": 253,
"char_start": 190,
"line": " if os.path.commonprefix((root, path)) == root:\n",
"line_no": 5
},
{
"char_end": 283,
"char_start": 253,
"line": " yield path\n",
"line_no": 6
}
],
"deleted": [
{
"char_end": 188,
"char_start": 129,
"line": " yield os.path.join(root, url[len(prefix):])\n",
"line_no": 4
}
]
},
"vul_type": "cwe-022"
} | 9 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def candidate_paths_for_url(self, url):\n for root, prefix in self.directories:\n if url.startswith(prefix):",
" path = os.path.join(root, url[len(prefix):])\n if os.path.commonprefix((root, path)) == root:\n yield path"
] | [
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 151,
"char_start": 145,
"chars": "path ="
},
{
"char_end": 283,
"char_start": 189,
"chars": "\n if os.path.commonprefix((root, path)) == root:\n yield path"
}
],
"deleted": [
{
"char_end": 150,
"char_start": 145,
"chars": "yield"
}
]
},
"commit_link": "github.com/evansd/whitenoise/commit/4d8a3ab1e97d7ddb18b3fa8b4909c92bad5529c6",
"file_name": "whitenoise/base.py",
"func_name": "candidate_paths_for_url",
"line_changes": {
"added": [
{
"char_end": 190,
"char_start": 129,
"line": " path = os.path.join(root, url[len(prefix):])\n",
"line_no": 4
},
{
"char_end": 253,
"char_start": 190,
"line": " if os.path.commonprefix((root, path)) == root:\n",
"line_no": 5
},
{
"char_end": 283,
"char_start": 253,
"line": " yield path\n",
"line_no": 6
}
],
"deleted": [
{
"char_end": 188,
"char_start": 129,
"line": " yield os.path.join(root, url[len(prefix):])\n",
"line_no": 4
}
]
},
"vul_type": "cwe-022"
} | 9 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def updateKey(client):\n\t\"\"\"Updates the contents of a key that already exists in our system.\n\tReturns an error if the specified key doesn't exist for the specified user.\n\t\"\"\"\n\tglobal NOT_FOUND\n\tglobal CREATED",
"\tvalidateClient(client)",
"",
"\tclient_pub_key = loadClientRSAKey(client)\n\ttok... | [
1,
1,
0,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 406,
"char_start": 369,
"chars": ")\n\tvalidateKeyName(token_data['name']"
}
],
"deleted": [
{
"char_end": 234,
"char_start": 233,
"chars": "\n"
}
]
},
"commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833",
"file_name": "impl.py",
"func_name": "updateKey",
"line_changes": {
"added": [
{
"char_end": 408,
"char_start": 371,
"line": "\tvalidateKeyName(token_data['name'])\n",
"line_no": 12
}
],
"deleted": [
{
"char_end": 234,
"char_start": 233,
"line": "\n",
"line_no": 9
}
]
},
"vul_type": "cwe-022"
} | 10 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def updateKey(client):\n\t\"\"\"Updates the contents of a key that already exists in our system.\n\tReturns an error if the specified key doesn't exist for the specified user.\n\t\"\"\"\n\tglobal NOT_FOUND\n\tglobal CREATED",
"\tvalidateClient(client)",
"",
"\tclient_pub_key = loadClientRSAKey(client)\n\ttok... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 406,
"char_start": 369,
"chars": ")\n\tvalidateKeyName(token_data['name']"
}
],
"deleted": [
{
"char_end": 234,
"char_start": 233,
"chars": "\n"
}
]
},
"commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833",
"file_name": "impl.py",
"func_name": "updateKey",
"line_changes": {
"added": [
{
"char_end": 408,
"char_start": 371,
"line": "\tvalidateKeyName(token_data['name'])\n",
"line_no": 12
}
],
"deleted": [
{
"char_end": 234,
"char_start": 233,
"line": "\n",
"line_no": 9
}
]
},
"vul_type": "cwe-022"
} | 10 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def create_basename_core(basename):\n try:\n basename = basename.casefold()\n except Exception:\n basename = basename.lower()\n",
" basename = basename.replace(' ', '-')",
" basename = re.sub(r'<[^>]*>', r'', basename)\n basename = re.sub(r'[^a-z0-9\\-]', r'', basename)\n basena... | [
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 159,
"char_start": 158,
"chars": "r"
},
{
"char_end": 164,
"char_start": 161,
"chars": "sub"
},
{
"char_end": 166,
"char_start": 165,
"chars": "r"
},
{
"char_end": 168,
"char_start": 167,
"chars": "["
},
{
"char_end": 173,
"char_start": 169,
"chars": "\\./]"
},
{
"char_end": 177,
"char_start": 176,
"chars": "r"
},
{
"char_end": 190,
"char_start": 180,
"chars": ", basename"
}
],
"deleted": [
{
"char_end": 165,
"char_start": 158,
"chars": "basenam"
},
{
"char_end": 175,
"char_start": 168,
"chars": "eplace("
}
]
},
"commit_link": "github.com/syegulalp/mercury/commit/3f7c7442fa49aec37577dbdb47ce11a848e7bd03",
"file_name": "MeTal/core/utils.py",
"func_name": "create_basename_core",
"line_changes": {
"added": [
{
"char_end": 192,
"char_start": 143,
"line": " basename = re.sub(r'[ \\./]', r'-', basename)\n",
"line_no": 7
}
],
"deleted": [
{
"char_end": 185,
"char_start": 143,
"line": " basename = basename.replace(' ', '-')\n",
"line_no": 7
}
]
},
"vul_type": "cwe-022"
} | 11 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def create_basename_core(basename):\n try:\n basename = basename.casefold()\n except Exception:\n basename = basename.lower()\n",
" basename = re.sub(r'[ \\./]', r'-', basename)",
" basename = re.sub(r'<[^>]*>', r'', basename)\n basename = re.sub(r'[^a-z0-9\\-]', r'', basename)\n ... | [
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 159,
"char_start": 158,
"chars": "r"
},
{
"char_end": 164,
"char_start": 161,
"chars": "sub"
},
{
"char_end": 166,
"char_start": 165,
"chars": "r"
},
{
"char_end": 168,
"char_start": 167,
"chars": "["
},
{
"char_end": 173,
"char_start": 169,
"chars": "\\./]"
},
{
"char_end": 177,
"char_start": 176,
"chars": "r"
},
{
"char_end": 190,
"char_start": 180,
"chars": ", basename"
}
],
"deleted": [
{
"char_end": 165,
"char_start": 158,
"chars": "basenam"
},
{
"char_end": 175,
"char_start": 168,
"chars": "eplace("
}
]
},
"commit_link": "github.com/syegulalp/mercury/commit/3f7c7442fa49aec37577dbdb47ce11a848e7bd03",
"file_name": "MeTal/core/utils.py",
"func_name": "create_basename_core",
"line_changes": {
"added": [
{
"char_end": 192,
"char_start": 143,
"line": " basename = re.sub(r'[ \\./]', r'-', basename)\n",
"line_no": 7
}
],
"deleted": [
{
"char_end": 185,
"char_start": 143,
"line": " basename = basename.replace(' ', '-')\n",
"line_no": 7
}
]
},
"vul_type": "cwe-022"
} | 11 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def get(self, key):\n try:",
" result = self.etcd.get(os.path.join(self.namespace, key))",
" except etcd.EtcdException as err:\n log_error(\"Error fetching key %s: [%r]\" % (key, repr(err)))\n raise CSStoreError('Error occurred while trying to get key')\n r... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 78,
"char_start": 77,
"chars": "_"
},
{
"char_end": 85,
"char_start": 79,
"chars": "bsolut"
},
{
"char_end": 88,
"char_start": 86,
"chars": "_k"
},
{
"char_end": 91,
"char_start": 89,
"chars": "y("
}
],
"deleted": [
{
"char_end": 85,
"char_start": 72,
"chars": "os.path.join("
},
{
"char_end": 91,
"char_start": 90,
"chars": "n"
},
{
"char_end": 94,
"char_start": 92,
"chars": "me"
},
{
"char_end": 98,
"char_start": 95,
"chars": "pac"
},
{
"char_end": 101,
"char_start": 99,
"chars": ", "
}
]
},
"commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4",
"file_name": "custodia/store/etcdstore.py",
"func_name": "get",
"line_changes": {
"added": [
{
"char_end": 97,
"char_start": 37,
"line": " result = self.etcd.get(self._absolute_key(key))\n",
"line_no": 3
}
],
"deleted": [
{
"char_end": 107,
"char_start": 37,
"line": " result = self.etcd.get(os.path.join(self.namespace, key))\n",
"line_no": 3
}
]
},
"vul_type": "cwe-022"
} | 12 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def get(self, key):\n try:",
" result = self.etcd.get(self._absolute_key(key))",
" except etcd.EtcdException as err:\n log_error(\"Error fetching key %s: [%r]\" % (key, repr(err)))\n raise CSStoreError('Error occurred while trying to get key')\n return resu... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 78,
"char_start": 77,
"chars": "_"
},
{
"char_end": 85,
"char_start": 79,
"chars": "bsolut"
},
{
"char_end": 88,
"char_start": 86,
"chars": "_k"
},
{
"char_end": 91,
"char_start": 89,
"chars": "y("
}
],
"deleted": [
{
"char_end": 85,
"char_start": 72,
"chars": "os.path.join("
},
{
"char_end": 91,
"char_start": 90,
"chars": "n"
},
{
"char_end": 94,
"char_start": 92,
"chars": "me"
},
{
"char_end": 98,
"char_start": 95,
"chars": "pac"
},
{
"char_end": 101,
"char_start": 99,
"chars": ", "
}
]
},
"commit_link": "github.com/latchset/custodia/commit/785fc87f38b4811bc4ce43a0a9b2267ee7d500b4",
"file_name": "custodia/store/etcdstore.py",
"func_name": "get",
"line_changes": {
"added": [
{
"char_end": 97,
"char_start": 37,
"line": " result = self.etcd.get(self._absolute_key(key))\n",
"line_no": 3
}
],
"deleted": [
{
"char_end": 107,
"char_start": 37,
"line": " result = self.etcd.get(os.path.join(self.namespace, key))\n",
"line_no": 3
}
]
},
"vul_type": "cwe-022"
} | 12 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"PHYSICALPATH_FUNC(mod_alias_physical_handler) {\n\tplugin_data *p = p_d;\n\tint uri_len, basedir_len;\n\tchar *uri_ptr;\n\tsize_t k;",
"\tif (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON;",
"\tmod_alias_patch_connection(srv, con, p);",
"\t/* not to include the tailing slash */\n\tbasedir_len = b... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1449,
"char_start": 931,
"chars": "/* check for path traversal in url-path following alias if key\n\t\t\t * does not end in slash, but replacement value ends in slash */\n\t\t\tif (uri_ptr[alias_len] == '.') {\n\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n\t\t\t\tif (*s == '.') ++s;\n\t\t\t\tif (*s == '/' || *s == '\\0') {\n\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n\t\t\t\t\t\tcon->http_status = 403;\n\t\t\t\t\t\treturn HANDLER_FINISHED;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t"
}
],
"deleted": []
},
"commit_link": "github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1",
"file_name": "src/mod_alias.c",
"func_name": "PHYSICALPATH_FUNC",
"line_changes": {
"added": [
{
"char_end": 994,
"char_start": 928,
"line": "\t\t\t/* check for path traversal in url-path following alias if key\n",
"line_no": 29
},
{
"char_end": 1062,
"char_start": 994,
"line": "\t\t\t * does not end in slash, but replacement value ends in slash */\n",
"line_no": 30
},
{
"char_end": 1098,
"char_start": 1062,
"line": "\t\t\tif (uri_ptr[alias_len] == '.') {\n",
"line_no": 31
},
{
"char_end": 1137,
"char_start": 1098,
"line": "\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n",
"line_no": 32
},
{
"char_end": 1161,
"char_start": 1137,
"line": "\t\t\t\tif (*s == '.') ++s;\n",
"line_no": 33
},
{
"char_end": 1196,
"char_start": 1161,
"line": "\t\t\t\tif (*s == '/' || *s == '\\0') {\n",
"line_no": 34
},
{
"char_end": 1248,
"char_start": 1196,
"line": "\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n",
"line_no": 35
},
{
"char_end": 1308,
"char_start": 1248,
"line": "\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n",
"line_no": 36
},
{
"char_end": 1366,
"char_start": 1308,
"line": "\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n",
"line_no": 37
},
{
"char_end": 1396,
"char_start": 1366,
"line": "\t\t\t\t\t\tcon->http_status = 403;\n",
"line_no": 38
},
{
"char_end": 1427,
"char_start": 1396,
"line": "\t\t\t\t\t\treturn HANDLER_FINISHED;\n",
"line_no": 39
},
{
"char_end": 1434,
"char_start": 1427,
"line": "\t\t\t\t\t}\n",
"line_no": 40
},
{
"char_end": 1440,
"char_start": 1434,
"line": "\t\t\t\t}\n",
"line_no": 41
},
{
"char_end": 1445,
"char_start": 1440,
"line": "\t\t\t}\n",
"line_no": 42
},
{
"char_end": 1446,
"char_start": 1445,
"line": "\n",
"line_no": 43
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 13 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"PHYSICALPATH_FUNC(mod_alias_physical_handler) {\n\tplugin_data *p = p_d;\n\tint uri_len, basedir_len;\n\tchar *uri_ptr;\n\tsize_t k;",
"\tif (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON;",
"\tmod_alias_patch_connection(srv, con, p);",
"\t/* not to include the tailing slash */\n\tbasedir_len = b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1449,
"char_start": 931,
"chars": "/* check for path traversal in url-path following alias if key\n\t\t\t * does not end in slash, but replacement value ends in slash */\n\t\t\tif (uri_ptr[alias_len] == '.') {\n\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n\t\t\t\tif (*s == '.') ++s;\n\t\t\t\tif (*s == '/' || *s == '\\0') {\n\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n\t\t\t\t\t\tcon->http_status = 403;\n\t\t\t\t\t\treturn HANDLER_FINISHED;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t"
}
],
"deleted": []
},
"commit_link": "github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1",
"file_name": "src/mod_alias.c",
"func_name": "PHYSICALPATH_FUNC",
"line_changes": {
"added": [
{
"char_end": 994,
"char_start": 928,
"line": "\t\t\t/* check for path traversal in url-path following alias if key\n",
"line_no": 29
},
{
"char_end": 1062,
"char_start": 994,
"line": "\t\t\t * does not end in slash, but replacement value ends in slash */\n",
"line_no": 30
},
{
"char_end": 1098,
"char_start": 1062,
"line": "\t\t\tif (uri_ptr[alias_len] == '.') {\n",
"line_no": 31
},
{
"char_end": 1137,
"char_start": 1098,
"line": "\t\t\t\tchar *s = uri_ptr + alias_len + 1;\n",
"line_no": 32
},
{
"char_end": 1161,
"char_start": 1137,
"line": "\t\t\t\tif (*s == '.') ++s;\n",
"line_no": 33
},
{
"char_end": 1196,
"char_start": 1161,
"line": "\t\t\t\tif (*s == '/' || *s == '\\0') {\n",
"line_no": 34
},
{
"char_end": 1248,
"char_start": 1196,
"line": "\t\t\t\t\tsize_t vlen = buffer_string_length(ds->value);\n",
"line_no": 35
},
{
"char_end": 1308,
"char_start": 1248,
"line": "\t\t\t\t\tif (0 != alias_len && ds->key->ptr[alias_len-1] != '/'\n",
"line_no": 36
},
{
"char_end": 1366,
"char_start": 1308,
"line": "\t\t\t\t\t && 0 != vlen && ds->value->ptr[vlen-1] == '/') {\n",
"line_no": 37
},
{
"char_end": 1396,
"char_start": 1366,
"line": "\t\t\t\t\t\tcon->http_status = 403;\n",
"line_no": 38
},
{
"char_end": 1427,
"char_start": 1396,
"line": "\t\t\t\t\t\treturn HANDLER_FINISHED;\n",
"line_no": 39
},
{
"char_end": 1434,
"char_start": 1427,
"line": "\t\t\t\t\t}\n",
"line_no": 40
},
{
"char_end": 1440,
"char_start": 1434,
"line": "\t\t\t\t}\n",
"line_no": 41
},
{
"char_end": 1445,
"char_start": 1440,
"line": "\t\t\t}\n",
"line_no": 42
},
{
"char_end": 1446,
"char_start": 1445,
"line": "\n",
"line_no": 43
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 13 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def download_check_files(self, filelist):\n # only admins and allowed users may download\n if not cherrypy.session['admin']:\n uo = self.useroptions.forUser(self.getUserId())\n if not uo.getOptionValue('media.may_download'):\n return 'not_permitted'\n # mak... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 455,
"char_start": 395,
"chars": "# don't allow to traverse up in the file system\n "
},
{
"char_end": 625,
"char_start": 469,
"chars": " or f.startswith('../'):\n return 'invalid_file'\n # CVE-2015-8309: do not allow absolute file paths\n if os.path.isabs(f)"
}
],
"deleted": []
},
"commit_link": "github.com/devsnd/cherrymusic/commit/62dec34a1ea0741400dd6b6c660d303dcd651e86",
"file_name": "cherrymusicserver/httphandler.py",
"func_name": "download_check_files",
"line_changes": {
"added": [
{
"char_end": 494,
"char_start": 443,
"line": " if '/../' in f or f.startswith('../'):\n",
"line_no": 10
},
{
"char_end": 532,
"char_start": 494,
"line": " return 'invalid_file'\n",
"line_no": 11
},
{
"char_end": 627,
"char_start": 594,
"line": " if os.path.isabs(f):\n",
"line_no": 13
}
],
"deleted": [
{
"char_end": 411,
"char_start": 383,
"line": " if '/../' in f:\n",
"line_no": 9
}
]
},
"vul_type": "cwe-022"
} | 14 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def download_check_files(self, filelist):\n # only admins and allowed users may download\n if not cherrypy.session['admin']:\n uo = self.useroptions.forUser(self.getUserId())\n if not uo.getOptionValue('media.may_download'):\n return 'not_permitted'\n # mak... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 455,
"char_start": 395,
"chars": "# don't allow to traverse up in the file system\n "
},
{
"char_end": 625,
"char_start": 469,
"chars": " or f.startswith('../'):\n return 'invalid_file'\n # CVE-2015-8309: do not allow absolute file paths\n if os.path.isabs(f)"
}
],
"deleted": []
},
"commit_link": "github.com/devsnd/cherrymusic/commit/62dec34a1ea0741400dd6b6c660d303dcd651e86",
"file_name": "cherrymusicserver/httphandler.py",
"func_name": "download_check_files",
"line_changes": {
"added": [
{
"char_end": 494,
"char_start": 443,
"line": " if '/../' in f or f.startswith('../'):\n",
"line_no": 10
},
{
"char_end": 532,
"char_start": 494,
"line": " return 'invalid_file'\n",
"line_no": 11
},
{
"char_end": 627,
"char_start": 594,
"line": " if os.path.isabs(f):\n",
"line_no": 13
}
],
"deleted": [
{
"char_end": 411,
"char_start": 383,
"line": " if '/../' in f:\n",
"line_no": 9
}
]
},
"vul_type": "cwe-022"
} | 14 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def get_files(self, submit_id, password=None, astree=False):\n \"\"\"\n Returns files from a submitted analysis.\n @param password: The password to unlock container archives with\n @param astree: sflock option; determines the format in which the files are returned\n @return: A tr... | [
1,
1,
0,
1,
0,
1,
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 638,
"char_start": 637,
"chars": "m"
},
{
"char_end": 718,
"char_start": 717,
"chars": "p"
},
{
"char_end": 721,
"char_start": 720,
"chars": "h"
},
{
"char_end": 870,
"char_start": 857,
"chars": "sanitize=True"
}
],
"deleted": [
{
"char_end": 661,
"char_start": 631,
"chars": "data[\"data\"])\n "
},
{
"char_end": 675,
"char_start": 665,
"chars": "data = ope"
},
{
"char_end": 682,
"char_start": 676,
"chars": "(filep"
},
{
"char_end": 694,
"char_start": 683,
"chars": "th, \"rb\").r"
},
{
"char_end": 698,
"char_start": 695,
"chars": "ad("
},
{
"char_end": 796,
"char_start": 776,
"chars": "name, contents=filed"
},
{
"char_end": 799,
"char_start": 798,
"chars": "a"
},
{
"char_end": 820,
"char_start": 800,
"chars": "\n "
},
{
"char_end": 1806,
"char_start": 1791,
"chars": "{\n \""
},
{
"char_end": 1867,
"char_start": 1811,
"chars": "\": files,\n \"path\": submit.tmp_path,\n }"
}
]
},
"commit_link": "github.com/cuckoosandbox/cuckoo/commit/168cabf86730d56b7fa319278bf0f0034052666a",
"file_name": "cuckoo/core/submit.py",
"func_name": "get_files",
"line_changes": {
"added": [
{
"char_end": 641,
"char_start": 574,
"line": " filepath = os.path.join(submit.tmp_path, filename)\n",
"line_no": 14
},
{
"char_end": 764,
"char_start": 684,
"line": " filepath=filepath, password=password, duplicates=duplicates\n",
"line_no": 17
},
{
"char_end": 872,
"char_start": 810,
"line": " unpacked = unpacked.astree(sanitize=True)\n",
"line_no": 21
},
{
"char_end": 1711,
"char_start": 1691,
"line": " return files\n",
"line_no": 47
}
],
"deleted": [
{
"char_end": 645,
"char_start": 574,
"line": " filepath = os.path.join(submit.tmp_path, data[\"data\"])\n",
"line_no": 14
},
{
"char_end": 700,
"char_start": 645,
"line": " filedata = open(filepath, \"rb\").read()\n",
"line_no": 15
},
{
"char_end": 801,
"char_start": 743,
"line": " filepath=filename, contents=filedata,\n",
"line_no": 18
},
{
"char_end": 862,
"char_start": 801,
"line": " password=password, duplicates=duplicates\n",
"line_no": 19
},
{
"char_end": 957,
"char_start": 908,
"line": " unpacked = unpacked.astree()\n",
"line_no": 23
},
{
"char_end": 1793,
"char_start": 1776,
"line": " return {\n",
"line_no": 49
},
{
"char_end": 1821,
"char_start": 1793,
"line": " \"files\": files,\n",
"line_no": 50
},
{
"char_end": 1858,
"char_start": 1821,
"line": " \"path\": submit.tmp_path,\n",
"line_no": 51
},
{
"char_end": 1867,
"char_start": 1858,
"line": " }\n",
"line_no": 52
}
]
},
"vul_type": "cwe-022"
} | 15 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def get_files(self, submit_id, password=None, astree=False):\n \"\"\"\n Returns files from a submitted analysis.\n @param password: The password to unlock container archives with\n @param astree: sflock option; determines the format in which the files are returned\n @return: A tr... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 638,
"char_start": 637,
"chars": "m"
},
{
"char_end": 718,
"char_start": 717,
"chars": "p"
},
{
"char_end": 721,
"char_start": 720,
"chars": "h"
},
{
"char_end": 870,
"char_start": 857,
"chars": "sanitize=True"
}
],
"deleted": [
{
"char_end": 661,
"char_start": 631,
"chars": "data[\"data\"])\n "
},
{
"char_end": 675,
"char_start": 665,
"chars": "data = ope"
},
{
"char_end": 682,
"char_start": 676,
"chars": "(filep"
},
{
"char_end": 694,
"char_start": 683,
"chars": "th, \"rb\").r"
},
{
"char_end": 698,
"char_start": 695,
"chars": "ad("
},
{
"char_end": 796,
"char_start": 776,
"chars": "name, contents=filed"
},
{
"char_end": 799,
"char_start": 798,
"chars": "a"
},
{
"char_end": 820,
"char_start": 800,
"chars": "\n "
},
{
"char_end": 1806,
"char_start": 1791,
"chars": "{\n \""
},
{
"char_end": 1867,
"char_start": 1811,
"chars": "\": files,\n \"path\": submit.tmp_path,\n }"
}
]
},
"commit_link": "github.com/cuckoosandbox/cuckoo/commit/168cabf86730d56b7fa319278bf0f0034052666a",
"file_name": "cuckoo/core/submit.py",
"func_name": "get_files",
"line_changes": {
"added": [
{
"char_end": 641,
"char_start": 574,
"line": " filepath = os.path.join(submit.tmp_path, filename)\n",
"line_no": 14
},
{
"char_end": 764,
"char_start": 684,
"line": " filepath=filepath, password=password, duplicates=duplicates\n",
"line_no": 17
},
{
"char_end": 872,
"char_start": 810,
"line": " unpacked = unpacked.astree(sanitize=True)\n",
"line_no": 21
},
{
"char_end": 1711,
"char_start": 1691,
"line": " return files\n",
"line_no": 47
}
],
"deleted": [
{
"char_end": 645,
"char_start": 574,
"line": " filepath = os.path.join(submit.tmp_path, data[\"data\"])\n",
"line_no": 14
},
{
"char_end": 700,
"char_start": 645,
"line": " filedata = open(filepath, \"rb\").read()\n",
"line_no": 15
},
{
"char_end": 801,
"char_start": 743,
"line": " filepath=filename, contents=filedata,\n",
"line_no": 18
},
{
"char_end": 862,
"char_start": 801,
"line": " password=password, duplicates=duplicates\n",
"line_no": 19
},
{
"char_end": 957,
"char_start": 908,
"line": " unpacked = unpacked.astree()\n",
"line_no": 23
},
{
"char_end": 1793,
"char_start": 1776,
"line": " return {\n",
"line_no": 49
},
{
"char_end": 1821,
"char_start": 1793,
"line": " \"files\": files,\n",
"line_no": 50
},
{
"char_end": 1858,
"char_start": 1821,
"line": " \"path\": submit.tmp_path,\n",
"line_no": 51
},
{
"char_end": 1867,
"char_start": 1858,
"line": " }\n",
"line_no": 52
}
]
},
"vul_type": "cwe-022"
} | 15 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def handle(self, keepalive=True, initial_timeout=None):\n # we are requested to skip processing and keep the previous values\n if self.skip:\n return self.response.handle()",
" # default to no keepalive in case something happens while even trying ensure we have a request\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1890,
"char_start": 1827,
"chars": ")\n self.resource = urllib.parse.unquote(resource"
}
],
"deleted": [
{
"char_end": 1778,
"char_start": 1773,
"chars": "self."
}
]
},
"commit_link": "github.com/fkmclane/python-fooster-web/commit/80202a6d3788ad1212a162d19785c600025e6aa4",
"file_name": "fooster/web/web.py",
"func_name": "handle",
"line_changes": {
"added": [
{
"char_end": 1829,
"char_start": 1744,
"line": " self.method, resource, self.request_http = self.request_line.split()\n",
"line_no": 53
},
{
"char_end": 1892,
"char_start": 1829,
"line": " self.resource = urllib.parse.unquote(resource)\n",
"line_no": 54
}
],
"deleted": [
{
"char_end": 1834,
"char_start": 1744,
"line": " self.method, self.resource, self.request_http = self.request_line.split()\n",
"line_no": 53
}
]
},
"vul_type": "cwe-022"
} | 16 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def handle(self, keepalive=True, initial_timeout=None):\n # we are requested to skip processing and keep the previous values\n if self.skip:\n return self.response.handle()",
" # default to no keepalive in case something happens while even trying ensure we have a request\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1890,
"char_start": 1827,
"chars": ")\n self.resource = urllib.parse.unquote(resource"
}
],
"deleted": [
{
"char_end": 1778,
"char_start": 1773,
"chars": "self."
}
]
},
"commit_link": "github.com/fkmclane/python-fooster-web/commit/80202a6d3788ad1212a162d19785c600025e6aa4",
"file_name": "fooster/web/web.py",
"func_name": "handle",
"line_changes": {
"added": [
{
"char_end": 1829,
"char_start": 1744,
"line": " self.method, resource, self.request_http = self.request_line.split()\n",
"line_no": 53
},
{
"char_end": 1892,
"char_start": 1829,
"line": " self.resource = urllib.parse.unquote(resource)\n",
"line_no": 54
}
],
"deleted": [
{
"char_end": 1834,
"char_start": 1744,
"line": " self.method, self.resource, self.request_http = self.request_line.split()\n",
"line_no": 53
}
]
},
"vul_type": "cwe-022"
} | 16 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"int dd_delete_item(struct dump_dir *dd, const char *name)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */",
"",
"\n char *path = concat_path_file(dd->dd_dirname, name);\n int res = unlink(path);",
" if (res < 0)\n {\n if (errno == ENOENT)\n ... | [
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 276,
"char_start": 149,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_delete_item",
"line_changes": {
"added": [
{
"char_end": 185,
"char_start": 145,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 6
},
{
"char_end": 271,
"char_start": 185,
"line": " error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n",
"line_no": 7
},
{
"char_end": 272,
"char_start": 271,
"line": "\n",
"line_no": 8
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 17 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int dd_delete_item(struct dump_dir *dd, const char *name)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */",
"\n if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);",
"\n char *path = concat... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 276,
"char_start": 149,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_delete_item",
"line_changes": {
"added": [
{
"char_end": 185,
"char_start": 145,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 6
},
{
"char_end": 271,
"char_start": 185,
"line": " error_msg_and_die(\"Cannot delete item. '%s' is not a valid file name\", name);\n",
"line_no": 7
},
{
"char_end": 272,
"char_start": 271,
"line": "\n",
"line_no": 8
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 17 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def render(self, request):\n\t\taction = \"download\"\n\t\tif \"action\" in request.args:\n\t\t\taction = request.args[\"action\"][0]",
"\t\tif \"file\" in request.args:",
"\t\t\tfilename = request.args[\"file\"][0].decode('utf-8', 'ignore').encode('utf-8')\n\t\t\tfilename = re.sub(\"^/+\", \"/\", os.path.real... | [
1,
1,
0,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 183,
"char_start": 163,
"chars": "lenient_force_utf_8("
},
{
"char_end": 238,
"char_start": 222,
"chars": "sanitise_filenam"
},
{
"char_end": 240,
"char_start": 239,
"chars": "_"
},
{
"char_end": 247,
"char_start": 241,
"chars": "lashes"
}
],
"deleted": [
{
"char_end": 227,
"char_start": 186,
"chars": ".decode('utf-8', 'ignore').encode('utf-8'"
},
{
"char_end": 244,
"char_start": 243,
"chars": "r"
},
{
"char_end": 246,
"char_start": 245,
"chars": "."
},
{
"char_end": 249,
"char_start": 247,
"chars": "ub"
},
{
"char_end": 262,
"char_start": 250,
"chars": "\"^/+\", \"/\", "
}
]
},
"commit_link": "github.com/E2OpenPlugins/e2openplugin-OpenWebif/commit/a846b7664eda3a4c51a452e00638cf7337dc2013",
"file_name": "plugin/controllers/file.py",
"func_name": "render",
"line_changes": {
"added": [
{
"char_end": 208,
"char_start": 149,
"line": "\t\t\tfilename = lenient_force_utf_8(request.args[\"file\"][0])\n",
"line_no": 7
},
{
"char_end": 276,
"char_start": 208,
"line": "\t\t\tfilename = sanitise_filename_slashes(os.path.realpath(filename))\n",
"line_no": 8
}
],
"deleted": [
{
"char_end": 229,
"char_start": 149,
"line": "\t\t\tfilename = request.args[\"file\"][0].decode('utf-8', 'ignore').encode('utf-8')\n",
"line_no": 7
},
{
"char_end": 290,
"char_start": 229,
"line": "\t\t\tfilename = re.sub(\"^/+\", \"/\", os.path.realpath(filename))\n",
"line_no": 8
}
]
},
"vul_type": "cwe-022"
} | 18 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def render(self, request):\n\t\taction = \"download\"\n\t\tif \"action\" in request.args:\n\t\t\taction = request.args[\"action\"][0]",
"\t\tif \"file\" in request.args:",
"\t\t\tfilename = lenient_force_utf_8(request.args[\"file\"][0])\n\t\t\tfilename = sanitise_filename_slashes(os.path.realpath(filename))",
... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 183,
"char_start": 163,
"chars": "lenient_force_utf_8("
},
{
"char_end": 238,
"char_start": 222,
"chars": "sanitise_filenam"
},
{
"char_end": 240,
"char_start": 239,
"chars": "_"
},
{
"char_end": 247,
"char_start": 241,
"chars": "lashes"
}
],
"deleted": [
{
"char_end": 227,
"char_start": 186,
"chars": ".decode('utf-8', 'ignore').encode('utf-8'"
},
{
"char_end": 244,
"char_start": 243,
"chars": "r"
},
{
"char_end": 246,
"char_start": 245,
"chars": "."
},
{
"char_end": 249,
"char_start": 247,
"chars": "ub"
},
{
"char_end": 262,
"char_start": 250,
"chars": "\"^/+\", \"/\", "
}
]
},
"commit_link": "github.com/E2OpenPlugins/e2openplugin-OpenWebif/commit/a846b7664eda3a4c51a452e00638cf7337dc2013",
"file_name": "plugin/controllers/file.py",
"func_name": "render",
"line_changes": {
"added": [
{
"char_end": 208,
"char_start": 149,
"line": "\t\t\tfilename = lenient_force_utf_8(request.args[\"file\"][0])\n",
"line_no": 7
},
{
"char_end": 276,
"char_start": 208,
"line": "\t\t\tfilename = sanitise_filename_slashes(os.path.realpath(filename))\n",
"line_no": 8
}
],
"deleted": [
{
"char_end": 229,
"char_start": 149,
"line": "\t\t\tfilename = request.args[\"file\"][0].decode('utf-8', 'ignore').encode('utf-8')\n",
"line_no": 7
},
{
"char_end": 290,
"char_start": 229,
"line": "\t\t\tfilename = re.sub(\"^/+\", \"/\", os.path.realpath(filename))\n",
"line_no": 8
}
]
},
"vul_type": "cwe-022"
} | 18 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _inject_net_into_fs(net, fs, execute=None):\n \"\"\"Inject /etc/network/interfaces into the filesystem rooted at fs.",
" net is the contents of /etc/network/interfaces.\n \"\"\"",
" netdir = os.path.join(os.path.join(fs, 'etc'), 'network')",
" utils.execute('mkdir', '-p', netdir, run_as_ro... | [
1,
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 196,
"char_start": 194,
"chars": "_j"
},
{
"char_end": 210,
"char_start": 197,
"chars": "in_and_check_"
},
{
"char_end": 216,
"char_start": 214,
"chars": "_w"
},
{
"char_end": 224,
"char_start": 221,
"chars": "_fs"
},
{
"char_end": 431,
"char_start": 430,
"chars": "\n"
},
{
"char_end": 466,
"char_start": 458,
"chars": "'etc', '"
},
{
"char_end": 471,
"char_start": 469,
"chars": "wo"
},
{
"char_end": 474,
"char_start": 472,
"chars": "k'"
},
{
"char_end": 495,
"char_start": 494,
"chars": "_"
},
{
"char_end": 498,
"char_start": 496,
"chars": "nj"
},
{
"char_end": 505,
"char_start": 501,
"chars": "_fil"
},
{
"char_end": 509,
"char_start": 506,
"chars": "_in"
},
{
"char_end": 517,
"char_start": 510,
"chars": "o_fs(fs"
}
],
"deleted": [
{
"char_end": 202,
"char_start": 194,
"chars": "os.path."
},
{
"char_end": 210,
"char_start": 206,
"chars": "(os."
},
{
"char_end": 217,
"char_start": 214,
"chars": ".jo"
},
{
"char_end": 230,
"char_start": 229,
"chars": ")"
},
{
"char_end": 458,
"char_start": 456,
"chars": "di"
},
{
"char_end": 480,
"char_start": 479,
"chars": "u"
},
{
"char_end": 485,
"char_start": 483,
"chars": "s."
},
{
"char_end": 490,
"char_start": 486,
"chars": "xecu"
},
{
"char_end": 492,
"char_start": 491,
"chars": "e"
},
{
"char_end": 498,
"char_start": 493,
"chars": "'tee'"
},
{
"char_end": 523,
"char_start": 509,
"chars": "process_input="
},
{
"char_end": 544,
"char_start": 526,
"chars": ", run_as_root=True"
}
]
},
"commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7",
"file_name": "nova/virt/disk/api.py",
"func_name": "_inject_net_into_fs",
"line_changes": {
"added": [
{
"char_end": 247,
"char_start": 181,
"line": " netdir = _join_and_check_path_within_fs(fs, 'etc', 'network')\n",
"line_no": 6
},
{
"char_end": 431,
"char_start": 430,
"line": "\n",
"line_no": 10
},
{
"char_end": 490,
"char_start": 431,
"line": " netfile = os.path.join('etc', 'network', 'interfaces')\n",
"line_no": 11
},
{
"char_end": 532,
"char_start": 490,
"line": " _inject_file_into_fs(fs, netfile, net)\n",
"line_no": 12
}
],
"deleted": [
{
"char_end": 243,
"char_start": 181,
"line": " netdir = os.path.join(os.path.join(fs, 'etc'), 'network')\n",
"line_no": 6
},
{
"char_end": 475,
"char_start": 426,
"line": " netfile = os.path.join(netdir, 'interfaces')\n",
"line_no": 10
},
{
"char_end": 545,
"char_start": 475,
"line": " utils.execute('tee', netfile, process_input=net, run_as_root=True)\n",
"line_no": 11
}
]
},
"vul_type": "cwe-022"
} | 19 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _inject_net_into_fs(net, fs, execute=None):\n \"\"\"Inject /etc/network/interfaces into the filesystem rooted at fs.",
" net is the contents of /etc/network/interfaces.\n \"\"\"",
" netdir = _join_and_check_path_within_fs(fs, 'etc', 'network')",
" utils.execute('mkdir', '-p', netdir, run_a... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 196,
"char_start": 194,
"chars": "_j"
},
{
"char_end": 210,
"char_start": 197,
"chars": "in_and_check_"
},
{
"char_end": 216,
"char_start": 214,
"chars": "_w"
},
{
"char_end": 224,
"char_start": 221,
"chars": "_fs"
},
{
"char_end": 431,
"char_start": 430,
"chars": "\n"
},
{
"char_end": 466,
"char_start": 458,
"chars": "'etc', '"
},
{
"char_end": 471,
"char_start": 469,
"chars": "wo"
},
{
"char_end": 474,
"char_start": 472,
"chars": "k'"
},
{
"char_end": 495,
"char_start": 494,
"chars": "_"
},
{
"char_end": 498,
"char_start": 496,
"chars": "nj"
},
{
"char_end": 505,
"char_start": 501,
"chars": "_fil"
},
{
"char_end": 509,
"char_start": 506,
"chars": "_in"
},
{
"char_end": 517,
"char_start": 510,
"chars": "o_fs(fs"
}
],
"deleted": [
{
"char_end": 202,
"char_start": 194,
"chars": "os.path."
},
{
"char_end": 210,
"char_start": 206,
"chars": "(os."
},
{
"char_end": 217,
"char_start": 214,
"chars": ".jo"
},
{
"char_end": 230,
"char_start": 229,
"chars": ")"
},
{
"char_end": 458,
"char_start": 456,
"chars": "di"
},
{
"char_end": 480,
"char_start": 479,
"chars": "u"
},
{
"char_end": 485,
"char_start": 483,
"chars": "s."
},
{
"char_end": 490,
"char_start": 486,
"chars": "xecu"
},
{
"char_end": 492,
"char_start": 491,
"chars": "e"
},
{
"char_end": 498,
"char_start": 493,
"chars": "'tee'"
},
{
"char_end": 523,
"char_start": 509,
"chars": "process_input="
},
{
"char_end": 544,
"char_start": 526,
"chars": ", run_as_root=True"
}
]
},
"commit_link": "github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7",
"file_name": "nova/virt/disk/api.py",
"func_name": "_inject_net_into_fs",
"line_changes": {
"added": [
{
"char_end": 247,
"char_start": 181,
"line": " netdir = _join_and_check_path_within_fs(fs, 'etc', 'network')\n",
"line_no": 6
},
{
"char_end": 431,
"char_start": 430,
"line": "\n",
"line_no": 10
},
{
"char_end": 490,
"char_start": 431,
"line": " netfile = os.path.join('etc', 'network', 'interfaces')\n",
"line_no": 11
},
{
"char_end": 532,
"char_start": 490,
"line": " _inject_file_into_fs(fs, netfile, net)\n",
"line_no": 12
}
],
"deleted": [
{
"char_end": 243,
"char_start": 181,
"line": " netdir = os.path.join(os.path.join(fs, 'etc'), 'network')\n",
"line_no": 6
},
{
"char_end": 475,
"char_start": 426,
"line": " netfile = os.path.join(netdir, 'interfaces')\n",
"line_no": 10
},
{
"char_end": 545,
"char_start": 475,
"line": " utils.execute('tee', netfile, process_input=net, run_as_root=True)\n",
"line_no": 11
}
]
},
"vul_type": "cwe-022"
} | 19 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def canonicalize(self):\n \"\"\"::",
" path = path.canonicalize()\n",
" Canonicalize path. ::",
"\n # \"/foo/baz\"\n Pyjo.Path.new('/foo/./bar/../baz').canonicalize()",
" # \"/../baz\"\n Pyjo.Path.new('/foo/../bar/../../baz').canonicalize... | [
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 124,
"char_start": 108,
"chars": " by resolving ``"
},
{
"char_end": 171,
"char_start": 125,
"chars": "`` and ``..``, in addition ``...`` will be\n "
},
{
"char_end": 232,
"char_start": 172,
"chars": " treated as ``.`` to protect from path traversal attacks."
},
{
"char_end": 494,
"char_start": 411,
"chars": "\n\n # \"/foo/bar\"\n Pyjo.Path.new('/foo/.../bar').canonicalize()"
},
{
"char_end": 624,
"char_start": 606,
"chars": "' or parts[i] == '"
},
{
"char_end": 646,
"char_start": 643,
"chars": "..."
}
],
"deleted": [
{
"char_end": 112,
"char_start": 110,
"chars": "::"
}
]
},
"commit_link": "github.com/dex4er/Pyjoyment/commit/e4b115bc80c41615b2133091af3a74ee5d995c2e",
"file_name": "Pyjo/Path.py",
"func_name": "canonicalize",
"line_changes": {
"added": [
{
"char_end": 168,
"char_start": 83,
"line": " Canonicalize path by resolving ``.`` and ``..``, in addition ``...`` will be\n",
"line_no": 6
},
{
"char_end": 233,
"char_start": 168,
"line": " treated as ``.`` to protect from path traversal attacks.\n",
"line_no": 7
},
{
"char_end": 413,
"char_start": 412,
"line": "\n",
"line_no": 14
},
{
"char_end": 495,
"char_start": 438,
"line": " Pyjo.Path.new('/foo/.../bar').canonicalize()\n",
"line_no": 16
},
{
"char_end": 649,
"char_start": 578,
"line": " if parts[i] == '' or parts[i] == '.' or parts[i] == '...':\n",
"line_no": 21
}
],
"deleted": [
{
"char_end": 113,
"char_start": 83,
"line": " Canonicalize path. ::\n",
"line_no": 6
},
{
"char_end": 425,
"char_start": 375,
"line": " if parts[i] == '.' or parts[i] == '':\n",
"line_no": 17
}
]
},
"vul_type": "cwe-022"
} | 20 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def canonicalize(self):\n \"\"\"::",
" path = path.canonicalize()\n",
" Canonicalize path by resolving ``.`` and ``..``, in addition ``...`` will be\n treated as ``.`` to protect from path traversal attacks.",
"\n # \"/foo/baz\"\n Pyjo.Path.new('/foo/./ba... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 124,
"char_start": 108,
"chars": " by resolving ``"
},
{
"char_end": 171,
"char_start": 125,
"chars": "`` and ``..``, in addition ``...`` will be\n "
},
{
"char_end": 232,
"char_start": 172,
"chars": " treated as ``.`` to protect from path traversal attacks."
},
{
"char_end": 494,
"char_start": 411,
"chars": "\n\n # \"/foo/bar\"\n Pyjo.Path.new('/foo/.../bar').canonicalize()"
},
{
"char_end": 624,
"char_start": 606,
"chars": "' or parts[i] == '"
},
{
"char_end": 646,
"char_start": 643,
"chars": "..."
}
],
"deleted": [
{
"char_end": 112,
"char_start": 110,
"chars": "::"
}
]
},
"commit_link": "github.com/dex4er/Pyjoyment/commit/e4b115bc80c41615b2133091af3a74ee5d995c2e",
"file_name": "Pyjo/Path.py",
"func_name": "canonicalize",
"line_changes": {
"added": [
{
"char_end": 168,
"char_start": 83,
"line": " Canonicalize path by resolving ``.`` and ``..``, in addition ``...`` will be\n",
"line_no": 6
},
{
"char_end": 233,
"char_start": 168,
"line": " treated as ``.`` to protect from path traversal attacks.\n",
"line_no": 7
},
{
"char_end": 413,
"char_start": 412,
"line": "\n",
"line_no": 14
},
{
"char_end": 495,
"char_start": 438,
"line": " Pyjo.Path.new('/foo/.../bar').canonicalize()\n",
"line_no": 16
},
{
"char_end": 649,
"char_start": 578,
"line": " if parts[i] == '' or parts[i] == '.' or parts[i] == '...':\n",
"line_no": 21
}
],
"deleted": [
{
"char_end": 113,
"char_start": 83,
"line": " Canonicalize path. ::\n",
"line_no": 6
},
{
"char_end": 425,
"char_start": 375,
"line": " if parts[i] == '.' or parts[i] == '':\n",
"line_no": 17
}
]
},
"vul_type": "cwe-022"
} | 20 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"CString CWebSock::GetSkinPath(const CString& sSkinName) {",
" CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkinName;",
"\n if (!CFile::IsDir(sRet)) {",
" sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkinName;",
"\n if (!CFile::IsDir(sRet)) {",
" sRet =... | [
1,
0,
1,
0,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 140,
"char_start": 62,
"chars": "const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n\n "
}
],
"deleted": [
{
"char_end": 128,
"char_start": 124,
"chars": "Name"
},
{
"char_end": 228,
"char_start": 224,
"chars": "Name"
},
{
"char_end": 321,
"char_start": 317,
"chars": "Name"
}
]
},
"commit_link": "github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773",
"file_name": "src/WebModules.cpp",
"func_name": "CWebSock::GetSkinPath",
"line_changes": {
"added": [
{
"char_end": 135,
"char_start": 58,
"line": " const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n",
"line_no": 2
},
{
"char_end": 136,
"char_start": 135,
"line": "\n",
"line_no": 3
},
{
"char_end": 204,
"char_start": 136,
"line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkin;\n",
"line_no": 4
},
{
"char_end": 300,
"char_start": 236,
"line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkin;\n",
"line_no": 7
},
{
"char_end": 389,
"char_start": 336,
"line": " sRet = CString(_SKINDIR_) + \"/\" + sSkin;\n",
"line_no": 10
}
],
"deleted": [
{
"char_end": 130,
"char_start": 58,
"line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkinName;\n",
"line_no": 2
},
{
"char_end": 230,
"char_start": 162,
"line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkinName;\n",
"line_no": 5
},
{
"char_end": 323,
"char_start": 266,
"line": " sRet = CString(_SKINDIR_) + \"/\" + sSkinName;\n",
"line_no": 8
}
]
},
"vul_type": "cwe-022"
} | 21 | cwe-022 | cpp |
Determine whether the {function_name} code is vulnerable or not. | [
"CString CWebSock::GetSkinPath(const CString& sSkinName) {",
" const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");",
" CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkin;",
"\n if (!CFile::IsDir(sRet)) {",
" sRet = CZNC::Get().GetCurPath() + \"/webs... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 140,
"char_start": 62,
"chars": "const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n\n "
}
],
"deleted": [
{
"char_end": 128,
"char_start": 124,
"chars": "Name"
},
{
"char_end": 228,
"char_start": 224,
"chars": "Name"
},
{
"char_end": 321,
"char_start": 317,
"chars": "Name"
}
]
},
"commit_link": "github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773",
"file_name": "src/WebModules.cpp",
"func_name": "CWebSock::GetSkinPath",
"line_changes": {
"added": [
{
"char_end": 135,
"char_start": 58,
"line": " const CString sSkin = sSkinName.Replace_n(\"/\", \"_\").Replace_n(\".\", \"_\");\n",
"line_no": 2
},
{
"char_end": 136,
"char_start": 135,
"line": "\n",
"line_no": 3
},
{
"char_end": 204,
"char_start": 136,
"line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkin;\n",
"line_no": 4
},
{
"char_end": 300,
"char_start": 236,
"line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkin;\n",
"line_no": 7
},
{
"char_end": 389,
"char_start": 336,
"line": " sRet = CString(_SKINDIR_) + \"/\" + sSkin;\n",
"line_no": 10
}
],
"deleted": [
{
"char_end": 130,
"char_start": 58,
"line": " CString sRet = CZNC::Get().GetZNCPath() + \"/webskins/\" + sSkinName;\n",
"line_no": 2
},
{
"char_end": 230,
"char_start": 162,
"line": " sRet = CZNC::Get().GetCurPath() + \"/webskins/\" + sSkinName;\n",
"line_no": 5
},
{
"char_end": 323,
"char_start": 266,
"line": " sRet = CString(_SKINDIR_) + \"/\" + sSkinName;\n",
"line_no": 8
}
]
},
"vul_type": "cwe-022"
} | 21 | cwe-022 | cpp |
Determine whether the {function_name} code is vulnerable or not. | [
"def addKey(client):\n\t\"\"\"Adds a new key with the specified name and contents.\n\tReturns an error if a key with the specified name already exists.\n\t\"\"\"\n\tglobal BAD_REQUEST\n\tglobal CREATED",
"\tvalidateClient(client)",
"",
"\tclient_pub_key = loadClientRSAKey(client)\n\ttoken_data = decodeRequest... | [
1,
1,
0,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 383,
"char_start": 346,
"chars": ")\n\tvalidateKeyName(token_data['name']"
}
],
"deleted": [
{
"char_end": 211,
"char_start": 210,
"chars": "\n"
}
]
},
"commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833",
"file_name": "impl.py",
"func_name": "addKey",
"line_changes": {
"added": [
{
"char_end": 385,
"char_start": 348,
"line": "\tvalidateKeyName(token_data['name'])\n",
"line_no": 12
}
],
"deleted": [
{
"char_end": 211,
"char_start": 210,
"line": "\n",
"line_no": 9
}
]
},
"vul_type": "cwe-022"
} | 22 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def addKey(client):\n\t\"\"\"Adds a new key with the specified name and contents.\n\tReturns an error if a key with the specified name already exists.\n\t\"\"\"\n\tglobal BAD_REQUEST\n\tglobal CREATED",
"\tvalidateClient(client)",
"",
"\tclient_pub_key = loadClientRSAKey(client)\n\ttoken_data = decodeRequest... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 383,
"char_start": 346,
"chars": ")\n\tvalidateKeyName(token_data['name']"
}
],
"deleted": [
{
"char_end": 211,
"char_start": 210,
"chars": "\n"
}
]
},
"commit_link": "github.com/Mimickal/FoxLock/commit/7c665e556987f4e2c1a75e143a1e80ae066ad833",
"file_name": "impl.py",
"func_name": "addKey",
"line_changes": {
"added": [
{
"char_end": 385,
"char_start": 348,
"line": "\tvalidateKeyName(token_data['name'])\n",
"line_no": 12
}
],
"deleted": [
{
"char_end": 211,
"char_start": 210,
"line": "\n",
"line_no": 9
}
]
},
"vul_type": "cwe-022"
} | 22 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"void dd_save_text(struct dump_dir *dd, const char *name, const char *data)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n",
"",
" char *full_path = concat_path_file(dd->dd_dirname, name);\n save_binary_file(full_path, data, strlen(data), dd->dd_uid, dd->dd_gi... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 291,
"char_start": 166,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_save_text",
"line_changes": {
"added": [
{
"char_end": 202,
"char_start": 162,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 6
},
{
"char_end": 286,
"char_start": 202,
"line": " error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n",
"line_no": 7
},
{
"char_end": 287,
"char_start": 286,
"line": "\n",
"line_no": 8
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 23 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void dd_save_text(struct dump_dir *dd, const char *name, const char *data)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n",
" if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n",
" char... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 291,
"char_start": 166,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_save_text",
"line_changes": {
"added": [
{
"char_end": 202,
"char_start": 162,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 6
},
{
"char_end": 286,
"char_start": 202,
"line": " error_msg_and_die(\"Cannot save text. '%s' is not a valid file name\", name);\n",
"line_no": 7
},
{
"char_end": 287,
"char_start": 286,
"line": "\n",
"line_no": 8
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 23 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def misc_file_checks(self):",
" print_header(\"MISC FILE CHECKS\")",
" #\n # Check for recommended and mandatory files\n #",
" filenames = (\"manifest.json\", \"LICENSE\", \"README.md\",\n \"scripts/install\", \"scripts/remove\",\n \"... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1184,
"char_start": 1153,
"chars": "Analyze nginx conf\n # - "
},
{
"char_end": 1292,
"char_start": 1240,
"chars": " - Spot path traversal issue vulnerability\n #"
},
{
"char_end": 1437,
"char_start": 1363,
"chars": "# Ignore subdirs or filename not containing nginx in the name\n "
},
{
"char_end": 1518,
"char_start": 1491,
"chars": " or \"nginx\" not in filename"
},
{
"char_end": 1606,
"char_start": 1544,
"chars": "\n\n #\n # 'add_header' usage\n #"
},
{
"char_end": 3888,
"char_start": 2089,
"chars": "\n\n #\n # Path traversal issues\n #\n lines = open(self.path + \"/conf/\" + filename).readlines()\n lines = [line.strip() for line in lines if not line.strip().startswith(\"#\")]\n # Let's find the first location line\n location_line = None\n path_traversal_vulnerable = False\n lines_iter = lines.__iter__()\n for line in lines_iter:\n if line.startswith(\"location\"):\n location_line = line\n break\n # Look at the next lines for an 'alias' directive\n if location_line is not None:\n for line in lines_iter:\n if line.startswith(\"location\"):\n # Entering a new location block ... abort here\n # and assume there's no alias block later...\n break\n if line.startswith(\"alias\"):\n # We should definitely check for path traversal issue\n # Does the location target ends with / ?\n target = location_line.split()[-2]\n if not target.endswith(\"/\"):\n path_traversal_vulnerable = True\n break\n if path_traversal_vulnerable:\n print_warning(\n \"The nginx configuration appears vulnerable to path traversal as explained in \"\n \"https://www.acunetix.com/vulnerabilities/web/path-traversal-via-misconfigured-nginx-alias/\\n\"\n \"To fix it, look at the first lines of the nginx conf of the example app : \"\n \"https://github.com/YunoHost/example_ynh/blob/master/conf/nginx.conf\"\n )"
}
],
"deleted": []
},
"commit_link": "github.com/YunoHost/package_linter/commit/f6e98894cfe841aedaa7efd590937f0255193913",
"file_name": "package_linter.py",
"func_name": "misc_file_checks",
"line_changes": {
"added": [
{
"char_end": 1520,
"char_start": 1425,
"line": " if not os.path.isfile(self.path + \"/conf/\" + filename) or \"nginx\" not in filename:\n",
"line_no": 42
},
{
"char_end": 1546,
"char_start": 1545,
"line": "\n",
"line_no": 44
}
],
"deleted": [
{
"char_end": 1336,
"char_start": 1268,
"line": " if not os.path.isfile(self.path + \"/conf/\" + filename):\n",
"line_no": 39
}
]
},
"vul_type": "cwe-022"
} | 24 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def misc_file_checks(self):",
" print_header(\"MISC FILE CHECKS\")",
" #\n # Check for recommended and mandatory files\n #",
" filenames = (\"manifest.json\", \"LICENSE\", \"README.md\",\n \"scripts/install\", \"scripts/remove\",\n \"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1184,
"char_start": 1153,
"chars": "Analyze nginx conf\n # - "
},
{
"char_end": 1292,
"char_start": 1240,
"chars": " - Spot path traversal issue vulnerability\n #"
},
{
"char_end": 1437,
"char_start": 1363,
"chars": "# Ignore subdirs or filename not containing nginx in the name\n "
},
{
"char_end": 1518,
"char_start": 1491,
"chars": " or \"nginx\" not in filename"
},
{
"char_end": 1606,
"char_start": 1544,
"chars": "\n\n #\n # 'add_header' usage\n #"
},
{
"char_end": 3888,
"char_start": 2089,
"chars": "\n\n #\n # Path traversal issues\n #\n lines = open(self.path + \"/conf/\" + filename).readlines()\n lines = [line.strip() for line in lines if not line.strip().startswith(\"#\")]\n # Let's find the first location line\n location_line = None\n path_traversal_vulnerable = False\n lines_iter = lines.__iter__()\n for line in lines_iter:\n if line.startswith(\"location\"):\n location_line = line\n break\n # Look at the next lines for an 'alias' directive\n if location_line is not None:\n for line in lines_iter:\n if line.startswith(\"location\"):\n # Entering a new location block ... abort here\n # and assume there's no alias block later...\n break\n if line.startswith(\"alias\"):\n # We should definitely check for path traversal issue\n # Does the location target ends with / ?\n target = location_line.split()[-2]\n if not target.endswith(\"/\"):\n path_traversal_vulnerable = True\n break\n if path_traversal_vulnerable:\n print_warning(\n \"The nginx configuration appears vulnerable to path traversal as explained in \"\n \"https://www.acunetix.com/vulnerabilities/web/path-traversal-via-misconfigured-nginx-alias/\\n\"\n \"To fix it, look at the first lines of the nginx conf of the example app : \"\n \"https://github.com/YunoHost/example_ynh/blob/master/conf/nginx.conf\"\n )"
}
],
"deleted": []
},
"commit_link": "github.com/YunoHost/package_linter/commit/f6e98894cfe841aedaa7efd590937f0255193913",
"file_name": "package_linter.py",
"func_name": "misc_file_checks",
"line_changes": {
"added": [
{
"char_end": 1520,
"char_start": 1425,
"line": " if not os.path.isfile(self.path + \"/conf/\" + filename) or \"nginx\" not in filename:\n",
"line_no": 42
},
{
"char_end": 1546,
"char_start": 1545,
"line": "\n",
"line_no": 44
}
],
"deleted": [
{
"char_end": 1336,
"char_start": 1268,
"line": " if not os.path.isfile(self.path + \"/conf/\" + filename):\n",
"line_no": 39
}
]
},
"vul_type": "cwe-022"
} | 24 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"void dd_save_binary(struct dump_dir* dd, const char* name, const char* data, unsigned size)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n",
"",
" char *full_path = concat_path_file(dd->dd_dirname, name);\n save_binary_file(full_path, data, size, dd->dd_uid, ... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 310,
"char_start": 183,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_save_binary",
"line_changes": {
"added": [
{
"char_end": 219,
"char_start": 179,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 6
},
{
"char_end": 305,
"char_start": 219,
"line": " error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n",
"line_no": 7
},
{
"char_end": 306,
"char_start": 305,
"line": "\n",
"line_no": 8
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 25 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void dd_save_binary(struct dump_dir* dd, const char* name, const char* data, unsigned size)\n{\n if (!dd->locked)\n error_msg_and_die(\"dump_dir is not opened\"); /* bug */\n",
" if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", nam... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 310,
"char_start": 183,
"chars": "if (!str_is_correct_filename(name))\n error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/dump_dir.c",
"func_name": "dd_save_binary",
"line_changes": {
"added": [
{
"char_end": 219,
"char_start": 179,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 6
},
{
"char_end": 305,
"char_start": 219,
"line": " error_msg_and_die(\"Cannot save binary. '%s' is not a valid file name\", name);\n",
"line_no": 7
},
{
"char_end": 306,
"char_start": 305,
"line": "\n",
"line_no": 8
}
],
"deleted": []
},
"vul_type": "cwe-022"
} | 25 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def pascal_case(value: str) -> str:",
" return stringcase.pascalcase(value)"
] | [
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 79,
"char_start": 69,
"chars": "_sanitize("
},
{
"char_end": 86,
"char_start": 85,
"chars": ")"
}
],
"deleted": []
},
"commit_link": "github.com/openapi-generators/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746",
"file_name": "openapi_python_client/utils.py",
"func_name": "pascal_case",
"line_changes": {
"added": [
{
"char_end": 86,
"char_start": 36,
"line": " return stringcase.pascalcase(_sanitize(value))\n",
"line_no": 2
}
],
"deleted": [
{
"char_end": 75,
"char_start": 36,
"line": " return stringcase.pascalcase(value)\n",
"line_no": 2
}
]
},
"vul_type": "cwe-022"
} | 26 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def pascal_case(value: str) -> str:",
" return stringcase.pascalcase(_sanitize(value))"
] | [
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 79,
"char_start": 69,
"chars": "_sanitize("
},
{
"char_end": 86,
"char_start": 85,
"chars": ")"
}
],
"deleted": []
},
"commit_link": "github.com/openapi-generators/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746",
"file_name": "openapi_python_client/utils.py",
"func_name": "pascal_case",
"line_changes": {
"added": [
{
"char_end": 86,
"char_start": 36,
"line": " return stringcase.pascalcase(_sanitize(value))\n",
"line_no": 2
}
],
"deleted": [
{
"char_end": 75,
"char_start": 36,
"line": " return stringcase.pascalcase(value)\n",
"line_no": 2
}
]
},
"vul_type": "cwe-022"
} | 26 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"cleanup_pathname(struct archive_write_disk *a)\n{\n\tchar *dest, *src;\n\tchar separator = '\\0';",
"\tdest = src = a->name;\n\tif (*src == '\\0') {\n\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t \"Invalid empty pathname\");\n\t\treturn (ARCHIVE_FAILED);\n\t}",
"#if defined(__CYGWIN__)\n\tcle... | [
1,
1,
1,
0,
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 543,
"char_start": 353,
"chars": " {\n\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t\t \"Path is absolute\");\n\t\t\treturn (ARCHIVE_FAILED);\n\t\t}\n"
},
{
"char_end": 568,
"char_start": 565,
"chars": "\n\t}"
}
],
"deleted": []
},
"commit_link": "github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526",
"file_name": "libarchive/archive_write_disk_posix.c",
"func_name": "cleanup_pathname",
"line_changes": {
"added": [
{
"char_end": 356,
"char_start": 336,
"line": "\tif (*src == '/') {\n",
"line_no": 17
},
{
"char_end": 415,
"char_start": 356,
"line": "\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n",
"line_no": 18
},
{
"char_end": 469,
"char_start": 415,
"line": "\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n",
"line_no": 19
},
{
"char_end": 511,
"char_start": 469,
"line": "\t\t\t \"Path is absolute\");\n",
"line_no": 20
},
{
"char_end": 539,
"char_start": 511,
"line": "\t\t\treturn (ARCHIVE_FAILED);\n",
"line_no": 21
},
{
"char_end": 543,
"char_start": 539,
"line": "\t\t}\n",
"line_no": 22
},
{
"char_end": 544,
"char_start": 543,
"line": "\n",
"line_no": 23
},
{
"char_end": 569,
"char_start": 566,
"line": "\t}\n",
"line_no": 25
}
],
"deleted": [
{
"char_end": 354,
"char_start": 336,
"line": "\tif (*src == '/')\n",
"line_no": 17
}
]
},
"vul_type": "cwe-022"
} | 27 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"cleanup_pathname(struct archive_write_disk *a)\n{\n\tchar *dest, *src;\n\tchar separator = '\\0';",
"\tdest = src = a->name;\n\tif (*src == '\\0') {\n\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t \"Invalid empty pathname\");\n\t\treturn (ARCHIVE_FAILED);\n\t}",
"#if defined(__CYGWIN__)\n\tcle... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 543,
"char_start": 353,
"chars": " {\n\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n\t\t\t \"Path is absolute\");\n\t\t\treturn (ARCHIVE_FAILED);\n\t\t}\n"
},
{
"char_end": 568,
"char_start": 565,
"chars": "\n\t}"
}
],
"deleted": []
},
"commit_link": "github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526",
"file_name": "libarchive/archive_write_disk_posix.c",
"func_name": "cleanup_pathname",
"line_changes": {
"added": [
{
"char_end": 356,
"char_start": 336,
"line": "\tif (*src == '/') {\n",
"line_no": 17
},
{
"char_end": 415,
"char_start": 356,
"line": "\t\tif (a->flags & ARCHIVE_EXTRACT_SECURE_NOABSOLUTEPATHS) {\n",
"line_no": 18
},
{
"char_end": 469,
"char_start": 415,
"line": "\t\t\tarchive_set_error(&a->archive, ARCHIVE_ERRNO_MISC,\n",
"line_no": 19
},
{
"char_end": 511,
"char_start": 469,
"line": "\t\t\t \"Path is absolute\");\n",
"line_no": 20
},
{
"char_end": 539,
"char_start": 511,
"line": "\t\t\treturn (ARCHIVE_FAILED);\n",
"line_no": 21
},
{
"char_end": 543,
"char_start": 539,
"line": "\t\t}\n",
"line_no": 22
},
{
"char_end": 544,
"char_start": 543,
"line": "\n",
"line_no": 23
},
{
"char_end": 569,
"char_start": 566,
"line": "\t}\n",
"line_no": 25
}
],
"deleted": [
{
"char_end": 354,
"char_start": 336,
"line": "\tif (*src == '/')\n",
"line_no": 17
}
]
},
"vul_type": "cwe-022"
} | 27 | cwe-022 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"struct dump_dir *create_dump_dir_from_problem_data(problem_data_t *problem_data, const char *base_dir_name)\n{\n INITIALIZE_LIBREPORT();",
" char *type = problem_data_get_content_or_NULL(problem_data, FILENAME_ANALYZER);",
" if (!type)\n {\n error_msg(_(\"Missing required item: '%s'\"), FILE... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
0,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 497,
"char_start": 349,
"chars": "if (!str_is_correct_filename(type))\n {\n error_msg(_(\"'%s' is not correct file name\"), FILENAME_ANALYZER);\n return NULL;\n }\n\n "
},
{
"char_end": 2558,
"char_start": 2383,
"chars": "!str_is_correct_filename(name))\n {\n error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);\n continue;\n }\n\n if ("
}
],
"deleted": [
{
"char_end": 2963,
"char_start": 2709,
"chars": "\n continue;\n }\n\n /* only files should contain '/' and those are handled earlier */\n if (name[0] == '.' || strchr(name, '/'))\n {\n error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);"
}
]
},
"commit_link": "github.com/abrt/libreport/commit/239c4f7d1f47265526b39ad70106767d00805277",
"file_name": "src/lib/create_dump_dir.c",
"func_name": "create_dump_dir_from_problem_data",
"line_changes": {
"added": [
{
"char_end": 385,
"char_start": 345,
"line": " if (!str_is_correct_filename(type))\n",
"line_no": 13
},
{
"char_end": 391,
"char_start": 385,
"line": " {\n",
"line_no": 14
},
{
"char_end": 465,
"char_start": 391,
"line": " error_msg(_(\"'%s' is not correct file name\"), FILENAME_ANALYZER);\n",
"line_no": 15
},
{
"char_end": 486,
"char_start": 465,
"line": " return NULL;\n",
"line_no": 16
},
{
"char_end": 492,
"char_start": 486,
"line": " }\n",
"line_no": 17
},
{
"char_end": 493,
"char_start": 492,
"line": "\n",
"line_no": 18
},
{
"char_end": 2415,
"char_start": 2371,
"line": " if (!str_is_correct_filename(name))\n",
"line_no": 82
},
{
"char_end": 2425,
"char_start": 2415,
"line": " {\n",
"line_no": 83
},
{
"char_end": 2513,
"char_start": 2425,
"line": " error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);\n",
"line_no": 84
},
{
"char_end": 2535,
"char_start": 2513,
"line": " continue;\n",
"line_no": 85
},
{
"char_end": 2545,
"char_start": 2535,
"line": " }\n",
"line_no": 86
},
{
"char_end": 2546,
"char_start": 2545,
"line": "\n",
"line_no": 87
}
],
"deleted": [
{
"char_end": 2817,
"char_start": 2743,
"line": " /* only files should contain '/' and those are handled earlier */\n",
"line_no": 90
},
{
"char_end": 2866,
"char_start": 2817,
"line": " if (name[0] == '.' || strchr(name, '/'))\n",
"line_no": 91
},
{
"char_end": 2876,
"char_start": 2866,
"line": " {\n",
"line_no": 92
},
{
"char_end": 2964,
"char_start": 2876,
"line": " error_msg(\"Problem data field name contains disallowed chars: '%s'\", name);\n",
"line_no": 93
},
{
"char_end": 2986,
"char_start": 2964,
"line": " continue;\n",
"line_no": 94
},
{
"char_end": 2996,
"char_start": 2986,
"line": " }\n",
"line_no": 95
},
{
"char_end": 2997,
"char_start": 2996,
"line": "\n",
"line_no": 96
}
]
},
"vul_type": "cwe-022"
} | 28 | cwe-022 | c |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 7