Closed spaceraccoon closed 1 week ago
Your submission is now in status Test run.
For information, the evaluation workflow is the following: Initial triage > Test run > Results analysis > Query review > Final decision > Pay > Closed
Your submission is now in status Results analysis.
For information, the evaluation workflow is the following: Initial triage > Test run > Results analysis > Query review > Final decision > Pay > Closed
Your submission is now in status Query review.
For information, the evaluation workflow is the following: Initial triage > Test run > Results analysis > Query review > Final decision > Pay > Closed
Hello @spaceraccoon, the CodeQL bug bounty program is closing soon. If you are still interested in receiving the bounty, please update your CodeQL PR with the necessary steps to get it merged. If there is no activity regarding this bounty in the next month, we will go ahead and close this submission. Thank you.
Closing due to inactivity and the closure of our bounty program.
Query PR
https://github.com/github/codeql/pull/13493
Language
C/C++
CVE(s) ID list
CWE
CVE-094: Improper Control of Generation of Code ('Code Injection')
Report
emscripten.h
. These are dangerous because they allow the WebAssembly to execute JavaScript code directly:sink.asExpr().isConstant()
.Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).
Blog post link
No response