|
1 | | -# SAP UI5 with CodeQL |
2 | | - |
3 | | -CodeQL queries and supporting models for the SAP UI5 JavaScript framework |
4 | | - |
5 | | -### Queries |
6 | | -- [XSS](javascript/frameworks/UI5/src/UI5Xss/UI5Xss.ql) |
7 | | -- [Log Injection](javascript/frameworks/UI5/src/UI5LogInjection/UI5LogInjection.ql) |
8 | | -- [Clickjacking](javascript/frameworks/UI5/src/UI5Clickjacking/UI5Clickjacking.ql) |
9 | | - |
10 | | -### Modeled UI5 framework elements |
11 | | - - UI5 AMD-style components (also via jQuery) |
12 | | - - MVC elements: |
13 | | - - UI5 Controllers and Data Models (literal/external JSON models) |
14 | | - - UI5 [declarative Views](DeclarativeApp.png) (XML/JSON/HTML/JS) |
15 | | - - Library/custom UI5 Controls |
16 | | - - Project naming conventions (e.g. Control-Renderer) |
17 | | - - Source/Sink definition via [ModelAsData extensions](javascript/frameworks/UI5/ext/ui5-data-extensions.yml#L61-L97) |
18 | | - - Controls inheritance via [ModelAsData extensions](javascript/frameworks/UI5/ext/ui5-data-extensions.yml#L42-L59) |
19 | | - |
20 | | -### Supported Features with tests |
21 | | -The following tables list the main supported features with corresponding test cases |
22 | | -#### Detecting XSS and Log injection vulnerabilities |
23 | | -|test | library controls | [MaD sources sinks](javascript/frameworks/UI5/ext/ui5-data-extensions.yml#L61-L97) | custom controls | UI5View | JS dataflow | HTML APIs | sanitizer | acc.path via handler | |
24 | | -| - | :-: | :-: | :-: | :-: | :-: | :-: | :-: | :-: | |
25 | | -| [xss-html-control](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/1033) | ✅︎ | ✅︎ | | XMLView | |
26 | | -| [xss-custom-control-api1](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/1051)| ✅︎ | ✅︎ | ✅︎ | XMLView | | classic | |
27 | | -| [xss-custom-control-api2](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/250)| ✅︎ | ✅︎ | ✅︎ | XMLView | | DOM | |
28 | | -| [xss-json-view](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/247)<br/>[xss-html-view](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/245)<br/>[xss-js-view](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/246) | ✅︎ | ✅︎ | | JsonView<br/>HTMLView<br/>JSView | |
29 | | -| [log-html-control-df](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/275) | ✅︎ | ✅︎ | |XMLView| ✅︎ | |
30 | | -| [sanitized](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/277)| ✅︎ | ✅︎ | ✅︎ | XMLView | ✅︎ | DOM | ✅︎ | |
31 | | -| [xss-event-handlers](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/335)| ✅︎ | ✅︎ | ✅︎ | XMLView | | | | ✅︎ | |
32 | | - |
33 | | -#### Detecting Clickjacking vulnerabilities |
34 | | -| test | secure | insecure frameOptions | missing frameOptions | |
35 | | -| - | :-: | :-: | :-: | |
36 | | -| [clickjacking-deny-all](javascript/frameworks/UI5/test/queries/UI5Clickjacking/clickjacking-deny-all/index.html#L10) | ✅︎ | | |
37 | | -| [clickjacking-allow-all:l9](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/240)<br/>[clickjacking-allow-all:l28](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/241) | | ✅︎ | |
38 | | -| [clickjacking-default-all](https://github.com/advanced-security/codeql-sap-js/security/code-scanning/330) | | | ✅︎ | |
| 1 | +# Overview |
| 2 | +[CodeQL](https://codeql.github.com/) models and queries for the SAP frameworks: |
| 3 | +- [CAP](javascript/frameworks/cap) (https://cap.cloud.sap/) |
| 4 | +- [UI5](javascript/frameworks/ui5) (https://sapui5.hana.ondemand.com/) |
| 5 | +- [XSJS](javascript/frameworks/xsjs) (https://www.npmjs.com/package/@sap/async-xsjs) |
0 commit comments