The DataSet.ReadXml method was called or referenced, and not within autogenerated code.
This rule classifies autogenerated code b:
ReadXmlSerializable
.ReadXmlSerializable
method has a System.Diagnostics.DebuggerNonUserCodeAttribute.ReadXmlSerializable
method is within a type that has a System.ComponentModel.DesignerCategoryAttribute.CA2361 is a similar rule, for when DataSet.ReadXml appears within autogenerated code.
Rule descriptionWhen deserializing a DataSet with untrusted input, an attacker can craft malicious input to perform a denial of service attack. There may be unknown remote code execution vulnerabilities.
For more information, see DataSet and DataTable security guidance.
How to fix violationsIt's safe to suppress a warning from this rule if:
If you just want to suppress a single violation, add preprocessor directives to your source file to disable and then re-enable the rule.
#pragma warning disable CA2351
// The code that's violating the rule is on this line.
#pragma warning restore CA2351
To disable the rule for a file, folder, or project, set its severity to none
in the configuration file.
[*.{cs,vb}]
dotnet_diagnostic.CA2351.severity = none
For more information, see How to suppress code analysis warnings.
Pseudo-code examples Violationusing System.Data;
public class ExampleClass
{
public DataSet MyDeserialize(string untrustedXml)
{
DataSet dt = new DataSet();
dt.ReadXml(untrustedXml);
}
}
CA2350: Ensure DataTable.ReadXml()'s input is trusted
CA2353: Unsafe DataSet or DataTable in serializable type
CA2355: Unsafe DataSet or DataTable in deserialized object graph
CA2356: Unsafe DataSet or DataTable in web deserialized object graph
CA2361: Ensure autogenerated class containing DataSet.ReadXml() is not used with untrusted data
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4