Contents
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the code scanning section on the GitHub blog, relevant GitHub Changelog updates, changes in the CodeQL extension for Visual Studio Code, and the CodeQL Action changelog.
Security Coverage¶CodeQL 2.10.4 runs a total of 352 security queries when configured with the Default suite (covering 146 CWE). The Extended suite enables an additional 106 queries (covering 30 more CWE). 12 security queries have been added with this release.
CodeQL CLI¶There are no user-facing CLI changes in this release.
Query Packs¶ Minor Analysis Improvements¶ C/C++¶The “Cleartext storage of sensitive information in buffer” (cpp/cleartext-storage-buffer
) query has been improved to produce fewer false positives.
Parameters of delegates passed to routing endpoint calls like MapGet
in ASP.NET Core are now considered remote flow sources.
The query cs/unsafe-deserialization-untrusted-input
is not reporting on all calls of JsonConvert.DeserializeObject
any longer, it only covers cases that explicitly use unsafe serialization settings.
Added better support for the SQLite framework in the SQL injection query.
File streams are now considered stored flow sources. For example, reading query elements from a file can lead to a Second Order SQL injection alert.
The query java/static-initialization-vector
no longer requires a Cipher
object to be initialized with ENCRYPT_MODE
to be considered a valid sink. Also, several new sanitizers were added.
Improved sanitizers for java/sensitive-log
, which removes some false positives and improves performance a bit.
Added a new query, java/android/implicitly-exported-component
, to detect if components are implicitly exported in the Android manifest.
A new query “Use of RSA algorithm without OAEP” (java/rsa-without-oaep
) has been added. This query finds uses of RSA encryption that don’t use the OAEP scheme.
Added a new query, java/android/debuggable-attribute-enabled
, to detect if the android:debuggable
attribute is enabled in the Android manifest.
The query “Using a static initialization vector for encryption” (java/static-initialization-vector
) has been promoted from experimental to the main query pack. This query was originally submitted as an experimental query by @artem-smotrakov.
A new query java/partial-path-traversal
finds partial path traversal vulnerabilities resulting from incorrectly using String#startsWith
to compare canonical paths.
Added a new query, java/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
Added a new query, py/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
Added a new query, py/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
Added a new query, rb/log-injection
, to detect cases where a malicious user may be able to forge log entries.
Added a new query, rb/incomplete-multi-character-sanitization
. The query finds string transformations that do not replace all occurrences of a multi-character substring.
Added a new query, rb/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
The queries java/redos
and java/polynomial-redos
now have a tag for CWE-1333.
Fixed that top-level for await
statements would produce a syntax error. These statements are now parsed correctly.
All deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
All deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Go 1.19 is now supported, including adding new taint propagation steps for new standard-library functions introduced in this release.
Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Fixed data-flow to captured variable references.
We now assume that if a channel-typed field is only referred to twice in the user codebase, once in a send operation and once in a receive, then data flows from the send to the receive statement. This enables finding some cross-goroutine flow.
Added new flow steps for the classes java.nio.file.Path
and java.nio.file.Paths
.
The class AndroidFragment
now also models the Android Jetpack version of the Fragment
class (androidx.fragment.app.Fragment
).
Java 19 builds can now be extracted. There are no non-preview new language features in this release, so the only user-visible change is that the CodeQL extractor will now correctly trace compilations using the JDK 19 release of javac
.
Classes and methods that are seen with several different paths during the extraction process (for example, packaged into different JAR files) now report an arbitrarily selected location via their getLocation
and hasLocationInfo
predicates, rather than reporting all of them. This may lead to reduced alert duplication.
The query java/hardcoded-credential-api-call
now recognises methods that consume usernames, passwords and keys from the JSch, Ganymed, Apache SSHD, sshj, Trilead SSH-2, Apache FTPClient and MongoDB projects.
Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Calls to render
in Rails controllers and views are now recognized as HTTP response bodies.
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
The utility files previously in the semmle.code.java.security.performance
package have been moved to the semmle.code.java.security.regexp
package.
The previous files still exist as deprecated aliases.
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
The utility files previously in the semmle.javascript.security.performance
package have been moved to the semmle.javascript.security.regexp
package.
The previous files still exist as deprecated aliases.
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
The utility files previously in the semmle.python.security.performance
package have been moved to the semmle.python.security.regexp
package.
The previous files still exist as deprecated aliases.
The utility files previously in the codeql.ruby.security.performance
package have been moved to the codeql.ruby.security.regexp
package.
The previous files still exist as deprecated aliases.
Added support for getting the link targets of global and namespace variables.
Added a BlockAssignExpr
class, which models a memcpy
-like operation used in compiler generated copy/move constructors and assignment operations.
Added a new predicate, requiresPermissions
, in the AndroidComponentXmlElement
and AndroidApplicationXmlElement
classes to detect if the element has explicitly set a value for its android:permission
attribute.
Added a new predicate, hasAnIntentFilterElement
, in the AndroidComponentXmlElement
class to detect if a component contains an intent filter element.
Added a new predicate, hasExportedAttribute
, in the AndroidComponentXmlElement
class to detect if a component has an android:exported
attribute.
Added a new class, AndroidCategoryXmlElement
, to represent a category element in an Android manifest file.
Added a new predicate, getACategoryElement
, in the AndroidIntentFilterXmlElement
class to get a category element of an intent filter.
Added a new predicate, isInBuildDirectory
, in the AndroidManifestXmlFile
class. This predicate detects if the manifest file is located in a build directory.
Added a new predicate, isDebuggable
, in the AndroidApplicationXmlElement
class. This predicate detects if the application element has its android:debuggable
attribute enabled.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4