Skip to content

Commit 6d31c6a

Browse files
authored
Merge branch 'main' into redsun82/fix-pytest-build-as-test-windows
2 parents b6aee67 + a0d2005 commit 6d31c6a

File tree

127 files changed

+14969
-1132
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

127 files changed

+14969
-1132
lines changed

config/dbscheme-fragments.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
"fragments": [
1010
"/*- Compilations -*/",
1111
"/*- External data -*/",
12+
"/*- Overlay support -*/",
1213
"/*- Files and folders -*/",
1314
"/*- Diagnostic messages -*/",
1415
"/*- Diagnostic messages: severity -*/",

cpp/ql/src/Security/CWE/CWE-327/BrokenCryptoAlgorithm.qhelp

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,15 @@
33
"qhelp.dtd">
44
<qhelp>
55
<overview>
6-
<p>Using broken or weak cryptographic algorithms can leave data vulnerable to being decrypted.</p>
7-
8-
<p>Many cryptographic algorithms provided by cryptography libraries are known to be weak, or
9-
flawed. Using such an algorithm means that an attacker may be able to easily decrypt the encrypted
10-
data.</p>
6+
<p>Using broken or weak cryptographic algorithms may compromise security guarantees such as confidentiality, integrity, and authenticity.</p>
7+
8+
<p>Many cryptographic algorithms are known to be weak or flawed. The security guarantees of a system often rely on the underlying cryptography, so using a weak algorithm can have severe consequences. For example:
9+
</p>
10+
<ul>
11+
<li>If a weak encryption algorithm is used, an attacker may be able to decrypt sensitive data.</li>
12+
<li>If a weak hashing algorithm is used to protect data integrity, an attacker may be able to craft a malicious input that has the same hash as a benign one.</li>
13+
<li>If a weak algorithm is used for digital signatures, an attacker may be able to forge signatures and impersonate legitimate users.</li>
14+
</ul>
1115

1216
</overview>
1317
<recommendation>

csharp/extractor/Semmle.Extraction.CSharp.DependencyFetching/DotNetCliInvoker.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ private ProcessStartInfo MakeDotnetStartInfo(string args, string? workingDirecto
4444
// Configure the proxy settings, if applicable.
4545
if (this.proxy != null)
4646
{
47-
logger.LogInfo($"Setting up Dependabot proxy at {this.proxy.Address}");
47+
logger.LogDebug($"Configuring environment variables for the Dependabot proxy at {this.proxy.Address}");
4848

4949
startInfo.EnvironmentVariables["HTTP_PROXY"] = this.proxy.Address;
5050
startInfo.EnvironmentVariables["HTTPS_PROXY"] = this.proxy.Address;
@@ -57,11 +57,11 @@ private ProcessStartInfo MakeDotnetStartInfo(string args, string? workingDirecto
5757
private bool RunCommandAux(string args, string? workingDirectory, out IList<string> output, bool silent)
5858
{
5959
var dirLog = string.IsNullOrWhiteSpace(workingDirectory) ? "" : $" in {workingDirectory}";
60-
logger.LogInfo($"Running '{Exec} {args}'{dirLog}");
6160
var pi = MakeDotnetStartInfo(args, workingDirectory);
6261
var threadId = Environment.CurrentManagedThreadId;
6362
void onOut(string s) => logger.Log(silent ? Severity.Debug : Severity.Info, s, threadId);
6463
void onError(string s) => logger.LogError(s, threadId);
64+
logger.LogInfo($"Running '{Exec} {args}'{dirLog}");
6565
var exitCode = pi.ReadOutput(out output, onOut, onError);
6666
if (exitCode != 0)
6767
{

docs/codeql/reusables/supported-frameworks.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -336,6 +336,8 @@ and the CodeQL library pack ``codeql/rust-all`` (`changelog <https://github.com/
336336
`log <https://crates.io/crates/log>`__, Logging library
337337
`md5 <https://crates.io/crates/md5>`__, Utility library
338338
`memchr <https://crates.io/crates/memchr>`__, Utility library
339+
`mysql <https://crates.io/crates/mysql>`__, Database
340+
`mysql_async <https://crates.io/crates/mysql_async>`__, Database
339341
`once_cell <https://crates.io/crates/once_cell>`__, Utility library
340342
`poem <https://crates.io/crates/poem>`__, Web framework
341343
`postgres <https://crates.io/crates/postgres>`__, Database

java/ql/integration-tests/java/query-suite/java-code-scanning.qls.expected

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ ql/java/ql/src/Security/CWE/CWE-094/JexlInjection.ql
2121
ql/java/ql/src/Security/CWE/CWE-094/MvelInjection.ql
2222
ql/java/ql/src/Security/CWE/CWE-094/SpelInjection.ql
2323
ql/java/ql/src/Security/CWE/CWE-094/TemplateInjection.ql
24+
ql/java/ql/src/Security/CWE/CWE-1004/SensitiveCookieNotHttpOnly.ql
2425
ql/java/ql/src/Security/CWE/CWE-1104/MavenPomDependsOnBintray.ql
2526
ql/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.ql
2627
ql/java/ql/src/Security/CWE/CWE-113/ResponseSplitting.ql

java/ql/integration-tests/java/query-suite/java-security-and-quality.qls.expected

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,7 @@ ql/java/ql/src/Security/CWE/CWE-094/JexlInjection.ql
127127
ql/java/ql/src/Security/CWE/CWE-094/MvelInjection.ql
128128
ql/java/ql/src/Security/CWE/CWE-094/SpelInjection.ql
129129
ql/java/ql/src/Security/CWE/CWE-094/TemplateInjection.ql
130+
ql/java/ql/src/Security/CWE/CWE-1004/SensitiveCookieNotHttpOnly.ql
130131
ql/java/ql/src/Security/CWE/CWE-1104/MavenPomDependsOnBintray.ql
131132
ql/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.ql
132133
ql/java/ql/src/Security/CWE/CWE-113/ResponseSplitting.ql

java/ql/integration-tests/java/query-suite/java-security-extended.qls.expected

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ ql/java/ql/src/Security/CWE/CWE-094/JexlInjection.ql
3030
ql/java/ql/src/Security/CWE/CWE-094/MvelInjection.ql
3131
ql/java/ql/src/Security/CWE/CWE-094/SpelInjection.ql
3232
ql/java/ql/src/Security/CWE/CWE-094/TemplateInjection.ql
33+
ql/java/ql/src/Security/CWE/CWE-1004/SensitiveCookieNotHttpOnly.ql
3334
ql/java/ql/src/Security/CWE/CWE-1104/MavenPomDependsOnBintray.ql
3435
ql/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.ql
3536
ql/java/ql/src/Security/CWE/CWE-113/ResponseSplitting.ql

java/ql/integration-tests/java/query-suite/not_included_in_qls.expected

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,6 @@ ql/java/ql/src/experimental/Security/CWE/CWE-094/ScriptInjection.ql
190190
ql/java/ql/src/experimental/Security/CWE/CWE-094/SpringImplicitViewManipulation.ql
191191
ql/java/ql/src/experimental/Security/CWE/CWE-094/SpringViewManipulation.ql
192192
ql/java/ql/src/experimental/Security/CWE/CWE-1004/InsecureTomcatConfig.ql
193-
ql/java/ql/src/experimental/Security/CWE/CWE-1004/SensitiveCookieNotHttpOnly.ql
194193
ql/java/ql/src/experimental/Security/CWE/CWE-200/InsecureWebResourceResponse.ql
195194
ql/java/ql/src/experimental/Security/CWE/CWE-200/SensitiveAndroidFileLeak.ql
196195
ql/java/ql/src/experimental/Security/CWE/CWE-208/PossibleTimingAttackAgainstSignature.ql
Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,13 @@
22
<qhelp>
33

44
<overview>
5-
<p>Cross-Site Scripting (XSS) is categorized as one of the OWASP Top 10 Security Vulnerabilities. The <code>HttpOnly</code> flag directs compatible browsers to prevent client-side script from accessing cookies. Including the <code>HttpOnly</code> flag in the Set-Cookie HTTP response header for a sensitive cookie helps mitigate the risk associated with XSS where an attacker's script code attempts to read the contents of a cookie and exfiltrate information obtained.</p>
5+
<p>Cookies without the <code>HttpOnly</code> flag set are accessible to client-side scripts (such as JavaScript) running in the same origin.
6+
In case of a Cross-Site Scripting (XSS) vulnerability, the cookie can be stolen by a malicious script.
7+
If a sensitive cookie does not need to be accessed directly by client-side scripts, the <code>HttpOnly</code> flag should be set.</p>
68
</overview>
79

810
<recommendation>
9-
<p>Use the <code>HttpOnly</code> flag when generating a cookie containing sensitive information to help mitigate the risk of client side script accessing the protected cookie.</p>
11+
<p>Use the <code>HttpOnly</code> flag when generating a cookie containing sensitive information to help mitigate the risk of client-side scripts accessing the protected cookie.</p>
1012
</recommendation>
1113

1214
<example>
@@ -23,5 +25,6 @@
2325
OWASP:
2426
<a href="https://owasp.org/www-community/HttpOnly">HttpOnly</a>
2527
</li>
28+
<li>MDN: <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Set-Cookie#httponly">Set-Cookie HttpOnly</a>.</li>
2629
</references>
2730
</qhelp>

0 commit comments

Comments
 (0)