Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions .idea/govwa.iml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 6 additions & 0 deletions .idea/vcs.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

67 changes: 67 additions & 0 deletions .idea/workspace.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

120 changes: 120 additions & 0 deletions go/aws-lambda/security/database-sqli.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,120 @@
package main

import (
"database/sql"
"encoding/json"
"log"
"os"
"context"

"github.com/aws/aws-lambda-go/events"
"github.com/aws/aws-lambda-go/lambda"
_ "github.com/go-sql-driver/mysql"
)

var (
db *sql.DB
err error
connectionString string
dbUser string
dbPass string
dataSource string
)

type Employee struct {
EmployeeNo int `json:"emp_no"`
FirstName string `json:"first_name"`
LastName string `json:"last_name"`
}

func init() {
connectionString = os.Getenv("CONN")
dbUser = os.Getenv("DBUSER")
dbPass = os.Getenv("DBPASS")
dataSource = dbUser + ":" + dbPass + "@tcp(" + connectionString + ")/employees"
}

func handler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {

searchCriteria := request.Body

db, err = sql.Open("mysql", dataSource)
if err != nil {
panic(err.Error())
}

defer db.Close()

// ruleid: database-sqli
results, err := db.Query("select e.emp_no, e.first_name, e.last_name " +
"from employees e, departments d, dept_emp de " +
"where de.emp_no = e.emp_no " +
"and de.dept_no = d.dept_no " +
"and d.dept_name = 'Marketing' " +
"and e.last_name LIKE '" + searchCriteria + "%';")

if err != nil {
log.Fatal(err)
}
defer results.Close()

// ok: database-sqli
results2, err2 := db.Query("select * from foobar")

employees := make([]Employee, 0)

for results.Next() {
var e Employee

err := results.Scan(&e.EmployeeNo, &e.FirstName, &e.LastName)
if err != nil {
log.Fatal(err)
}
employees = append(employees, e)
}

data, _ := json.Marshal(employees)

return events.APIGatewayProxyResponse{
StatusCode: 200,
Body: string(data),
IsBase64Encoded: false,
}, nil
}

func HandleRequest(ctx context.Context, name MyEvent) (string, error) {
searchCriteria := context.Smth

db, err = sql.Open("mysql", dataSource)
if err != nil {
panic(err.Error())
}

defer db.Close()

// ok: database-sqli
results, err := db.Query("select e.emp_no, e.first_name, e.last_name " +
"from employees e, departments d, dept_emp de " +
"where de.emp_no = e.emp_no " +
"and de.dept_no = d.dept_no " +
"and d.dept_name = 'Marketing' " +
"and e.last_name LIKE '" + searchCriteria + "%';")

if err != nil {
log.Fatal(err)
}
defer results.Close()

data, _ := json.Marshal(results)

return events.APIGatewayProxyResponse{
StatusCode: 200,
Body: string(data),
IsBase64Encoded: false,
}, nil
}

func main() {
lambda.Start(handler)
lambda.Start(HandleRequest)
}
62 changes: 62 additions & 0 deletions go/aws-lambda/security/database-sqli.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,62 @@
rules:
- id: database-sqli
languages:
- go
message: >-
Detected SQL statement that is tainted by `$EVENT` object. This could lead to SQL injection if the
variable is user-controlled
and not properly sanitized. In order to prevent SQL injection,
use parameterized queries or prepared statements instead.
You can use prepared statements with the 'Prepare' and 'PrepareContext' calls.
mode: taint
metadata:
references:
- https://pkg.go.dev/database/sql#DB.Query
category: security
owasp:
- A01:2017 - Injection
- A03:2021 - Injection
cwe:
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
technology:
- aws-lambda
- database
- sql
cwe2022-top25: true
cwe2021-top25: true
subcategory:
- vuln
likelihood: HIGH
impact: MEDIUM
confidence: MEDIUM
pattern-sinks:
- patterns:
- focus-metavariable: $QUERY
- pattern-either:
- pattern: $DB.Exec($QUERY,...)
- pattern: $DB.ExecContent($QUERY,...)
- pattern: $DB.Query($QUERY,...)
- pattern: $DB.QueryContext($QUERY,...)
- pattern: $DB.QueryRow($QUERY,...)
- pattern: $DB.QueryRowContext($QUERY,...)
- pattern-inside: |
import "database/sql"
...
pattern-sources:
- patterns:
- pattern-either:
- pattern-inside: |
func $HANDLER($CTX $CTXTYPE, $EVENT $TYPE, ...) {...}
...
lambda.Start($HANDLER, ...)
- patterns:
- pattern-inside: |
func $HANDLER($EVENT $TYPE) {...}
...
lambda.Start($HANDLER, ...)
- pattern-not-inside: |
func $HANDLER($EVENT context.Context) {...}
...
lambda.Start($HANDLER, ...)
- focus-metavariable: $EVENT
severity: WARNING
101 changes: 101 additions & 0 deletions go/aws-lambda/security/tainted-sql-string.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,101 @@
package main

import (
"database/sql"
"encoding/json"
"log"
"os"
"strconv"

"github.com/aws/aws-lambda-go/events"
"github.com/aws/aws-lambda-go/lambda"
_ "github.com/go-sql-driver/mysql"
)

var (
db *sql.DB
err error
connectionString string
dbUser string
dbPass string
dataSource string
)

type Employee struct {
EmployeeNo int `json:"emp_no"`
FirstName string `json:"first_name"`
LastName string `json:"last_name"`
}

func init() {
connectionString = os.Getenv("CONN")
dbUser = os.Getenv("DBUSER")
dbPass = os.Getenv("DBPASS")
dataSource = dbUser + ":" + dbPass + "@tcp(" + connectionString + ")/employees"
}

func handler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {

searchCriteria := request.Body

db, err = sql.Open("mysql", dataSource)
if err != nil {
panic(err.Error())
}

defer db.Close()

// ruleid: tainted-sql-string
results, err := db.Query("select e.emp_no, e.first_name, e.last_name " +
"from employees e, departments d, dept_emp de " +
"where e.last_name LIKE '" + searchCriteria + "%';")

if err != nil {
log.Fatal(err)
}
defer results.Close()
// ruleid: tainted-sql-string
_, err = db.Exec(`
DELETE FROM table WHERE Id = ` + request.Get("Id"))
// ruleid: tainted-sql-string
_, err = db.Exec("DELETE FROM table WHERE Id = " + request.Get("Id"))

// ok: tainted-sql-string
log.Printf("DELETE FROM table WHERE Id = " + request.Get("Id"))
// ok: tainted-sql-string
_, err = db.Exec(` FAKE
DELETE FROM table WHERE Id = ` + request.Get("Id"))

idhtml := request.Get("Id")
id, _ := strconv.Atoi(idhtml)

// ok: tainted-sql-string
_, err = db.Exec("DELETE FROM table WHERE Id = " + id)

// ok: tainted-sql-string
results2, err2 := db.Query("select * from foobar")

employees := make([]Employee, 0)

for results.Next() {
var e Employee

err := results.Scan(&e.EmployeeNo, &e.FirstName, &e.LastName)
if err != nil {
log.Fatal(err)
}
employees = append(employees, e)
}

data, _ := json.Marshal(employees)

return events.APIGatewayProxyResponse{
StatusCode: 200,
Body: string(data),
IsBase64Encoded: false,
}, nil
}

func main() {
lambda.Start(handler)
}
Loading