CodeQL 2.10.4 (2022-08-31)¶
Contents
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the code scanning section on the GitHub blog, relevant GitHub Changelog updates, changes in the CodeQL extension for Visual Studio Code, and the CodeQL Action changelog.
Security Coverage¶
CodeQL 2.10.4 runs a total of 352 security queries when configured with the Default suite (covering 146 CWE). The Extended suite enables an additional 106 queries (covering 30 more CWE). 12 security queries have been added with this release.
CodeQL CLI¶
There are no user-facing CLI changes in this release.
Query Packs¶
Minor Analysis Improvements¶
C/C++¶
- The “Cleartext storage of sensitive information in buffer” (
cpp/cleartext-storage-buffer
) query has been improved to produce fewer false positives.
C#¶
- Parameters of delegates passed to routing endpoint calls like
MapGet
in ASP.NET Core are now considered remote flow sources. - The query
cs/unsafe-deserialization-untrusted-input
is not reporting on all calls ofJsonConvert.DeserializeObject
any longer, it only covers cases that explicitly use unsafe serialization settings. - Added better support for the SQLite framework in the SQL injection query.
- File streams are now considered stored flow sources. For example, reading query elements from a file can lead to a Second Order SQL injection alert.
Java/Kotlin¶
- The query
java/static-initialization-vector
no longer requires aCipher
object to be initialized withENCRYPT_MODE
to be considered a valid sink. Also, several new sanitizers were added. - Improved sanitizers for
java/sensitive-log
, which removes some false positives and improves performance a bit.
New Queries¶
Java/Kotlin¶
- Added a new query,
java/android/implicitly-exported-component
, to detect if components are implicitly exported in the Android manifest. - A new query “Use of RSA algorithm without OAEP” (
java/rsa-without-oaep
) has been added. This query finds uses of RSA encryption that don’t use the OAEP scheme. - Added a new query,
java/android/debuggable-attribute-enabled
, to detect if theandroid:debuggable
attribute is enabled in the Android manifest. - The query “Using a static initialization vector for encryption” (
java/static-initialization-vector
) has been promoted from experimental to the main query pack. This query was originally submitted as an experimental query by @artem-smotrakov. - A new query
java/partial-path-traversal
finds partial path traversal vulnerabilities resulting from incorrectly usingString#startsWith
to compare canonical paths. - Added a new query,
java/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
JavaScript/TypeScript¶
- Added a new query,
py/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
Python¶
- Added a new query,
py/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
Ruby¶
- Added a new query,
rb/log-injection
, to detect cases where a malicious user may be able to forge log entries. - Added a new query,
rb/incomplete-multi-character-sanitization
. The query finds string transformations that do not replace all occurrences of a multi-character substring. - Added a new query,
rb/suspicious-regexp-range
, to detect character ranges in regular expressions that seem to match too many characters.
Language Libraries¶
Bug Fixes¶
JavaScript/TypeScript¶
- Fixed that top-level
for await
statements would produce a syntax error. These statements are now parsed correctly.
Minor Analysis Improvements¶
C/C++¶
- All deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
C#¶
- All deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Golang¶
- Go 1.19 is now supported, including adding new taint propagation steps for new standard-library functions introduced in this release.
- Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
- Fixed data-flow to captured variable references.
- We now assume that if a channel-typed field is only referred to twice in the user codebase, once in a send operation and once in a receive, then data flows from the send to the receive statement. This enables finding some cross-goroutine flow.
Java/Kotlin¶
- Added new flow steps for the classes
java.nio.file.Path
andjava.nio.file.Paths
. - The class
AndroidFragment
now also models the Android Jetpack version of theFragment
class (androidx.fragment.app.Fragment
). - Java 19 builds can now be extracted. There are no non-preview new language features in this release, so the only user-visible change is that the CodeQL extractor will now correctly trace compilations using the JDK 19 release of
javac
. - Classes and methods that are seen with several different paths during the extraction process (for example, packaged into different JAR files) now report an arbitrarily selected location via their
getLocation
andhasLocationInfo
predicates, rather than reporting all of them. This may lead to reduced alert duplication. - The query
java/hardcoded-credential-api-call
now recognises methods that consume usernames, passwords and keys from the JSch, Ganymed, Apache SSHD, sshj, Trilead SSH-2, Apache FTPClient and MongoDB projects.
JavaScript/TypeScript¶
- Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Python¶
- Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
Ruby¶
- Most deprecated predicates/classes/modules that have been deprecated for over a year have been deleted.
- Calls to
render
in Rails controllers and views are now recognized as HTTP response bodies.
Deprecated APIs¶
C/C++¶
- Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
C#¶
- Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
Java/Kotlin¶
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
The utility files previously in the
semmle.code.java.security.performance
package have been moved to thesemmle.code.java.security.regexp
package.The previous files still exist as deprecated aliases.
JavaScript/TypeScript¶
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
The utility files previously in the
semmle.javascript.security.performance
package have been moved to thesemmle.javascript.security.regexp
package.The previous files still exist as deprecated aliases.
Python¶
Many classes/predicates/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
The utility files previously in the
semmle.python.security.performance
package have been moved to thesemmle.python.security.regexp
package.The previous files still exist as deprecated aliases.
Ruby¶
The utility files previously in the
codeql.ruby.security.performance
package have been moved to thecodeql.ruby.security.regexp
package.The previous files still exist as deprecated aliases.
New Features¶
C/C++¶
- Added support for getting the link targets of global and namespace variables.
- Added a
BlockAssignExpr
class, which models amemcpy
-like operation used in compiler generated copy/move constructors and assignment operations.
Java/Kotlin¶
- Added a new predicate,
requiresPermissions
, in theAndroidComponentXmlElement
andAndroidApplicationXmlElement
classes to detect if the element has explicitly set a value for itsandroid:permission
attribute. - Added a new predicate,
hasAnIntentFilterElement
, in theAndroidComponentXmlElement
class to detect if a component contains an intent filter element. - Added a new predicate,
hasExportedAttribute
, in theAndroidComponentXmlElement
class to detect if a component has anandroid:exported
attribute. - Added a new class,
AndroidCategoryXmlElement
, to represent a category element in an Android manifest file. - Added a new predicate,
getACategoryElement
, in theAndroidIntentFilterXmlElement
class to get a category element of an intent filter. - Added a new predicate,
isInBuildDirectory
, in theAndroidManifestXmlFile
class. This predicate detects if the manifest file is located in a build directory. - Added a new predicate,
isDebuggable
, in theAndroidApplicationXmlElement
class. This predicate detects if the application element has itsandroid:debuggable
attribute enabled.