You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If I directly build a database and scan that, I get nothing. But if I comment out the first line and last line, I get a vulnerability:
"Regular expression injection","User input should not be used in regular expressions without first being escaped, otherwise a malicious user may be able to inject an expression that could require exponential time on certain inputs.","error","This regular expression is constructed from a [[""environment variable""|""relative:///52181.js:68:61:68:71""]].","/52181.js","86","20","86","47"
It seems like the semantics of function declarations within blocks is not that clear cut and may vary depending on the engine implementation (see some discussion here), although while some of that might be non-standard, it could be considered de facto standard based on the most common engines.
That said, your issue is prompting us to accommodate this use case (see #18661, currently work in progress), so a future release might deal with this case in a more appropriate way. So thanks again for this! 🙌
Here is the code(sorry I spent hours reducing the code but failed):
If I directly build a database and scan that, I get nothing. But if I comment out the first line and last line, I get a vulnerability:
The way I run codeql is like
The text was updated successfully, but these errors were encountered: