Use of externally-controlled format stringยถ
ID: js/tainted-format-string
Kind: path-problem
Security severity: 7.3
Severity: warning
Precision: high
Tags:
- security
- external/cwe/cwe-134
Query suites:
- javascript-code-scanning.qls
- javascript-security-extended.qls
- javascript-security-and-quality.qls
Click to see the query in the CodeQL repository
Functions like the Node.js standard library function util.format
accept a format string that is used to format the remaining arguments by providing inline format specifiers. If the format string contains unsanitized input from an untrusted source, then that string may contain unexpected format specifiers that cause garbled output.
Recommendationยถ
Either sanitize the input before including it in the format string, or use a %s
specifier in the format string, and pass the untrusted data as corresponding argument.
Exampleยถ
The following program snippet logs information about an unauthorized access attempt. The log message includes the user name, and the userโs IP address is passed as an additional argument to console.log
to be appended to the message:
const app = require("express")();
app.get("unauthorized", function handler(req, res) {
let user = req.query.user;
let ip = req.connection.remoteAddress;
console.log("Unauthorized access attempt by " + user, ip);
});
However, if a malicious user provides %d
as their user name, console.log
will instead attempt to format the ip
argument as a number. Since IP addresses are not valid numbers, the result of this conversion is NaN
. The resulting log message will read โUnauthorized access attempt by NaNโ, missing all the information that it was trying to log in the first place.
Instead, the user name should be included using the %s
specifier:
const app = require("express")();
app.get("unauthorized", function handler(req, res) {
let user = req.query.user;
let ip = req.connection.remoteAddress;
console.log("Unauthorized access attempt by %s", user, ip);
});
Referencesยถ
Node.js Documentation: util.format.
Common Weakness Enumeration: CWE-134.