CodeQL 2.11.0 (2022-09-28)¶
This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the code scanning section on the GitHub blog, relevant GitHub Changelog updates, changes in the CodeQL extension for Visual Studio Code, and the CodeQL Action changelog.
Security Coverage¶
CodeQL 2.11.0 runs a total of 353 security queries when configured with the Default suite (covering 148 CWE). The Extended suite enables an additional 109 queries (covering 30 more CWE). 4 security queries have been added with this release.
CodeQL CLI¶
Deprecations¶
The CodeQL CLI now uses Python 3 to extract both Python 2 and Python 3 databases. Correspondingly, support for using Python 2 to extract Python databases is now deprecated. Starting with version 2.11.3, you will need to install Python 3 to extract Python databases.
Miscellaneous¶
The build of Eclipse Temurin OpenJDK that is bundled with the CodeQL CLI has been updated to version 17.0.4.
Query Packs¶
Bug Fixes¶
JavaScript/TypeScript¶
Fixed a bug in the
js/type-confusion-through-parameter-tamperingquery that would cause it to ignore sanitizers in branching conditions. The query should now report fewer false positives.
Minor Analysis Improvements¶
C/C++¶
Modernizations from “Cleartext storage of sensitive information in buffer” (
cpp/cleartext-storage-buffer) have been ported to the “Cleartext storage of sensitive information in file” (cpp/cleartext-storage-file), “Cleartext transmission of sensitive information” (cpp/cleartext-transmission) and “Cleartext storage of sensitive information in an SQLite database” (cpp/cleartext-storage-database) queries. These changes may result in more correct results and fewer false positive results from these queries.The alert message of many queries have been changed to make the message consistent with other languages.
C#¶
A new extractor option has been introduced for disabling CIL extraction. Either pass
-Ocil=falseto thecodeqlCLI or set the environment variableCODEQL_EXTRACTOR_CSHARP_OPTION_CIL=false.The alert message of many queries have been changed to make the message consistent with other languages.
Golang¶
The alert message of many queries have been changed to make the message consistent with other languages.
Java/Kotlin¶
The Java extractor now populates the
Methodrelating to aMethodAccessconsistently for calls using an explicit and implicitthisqualifier. Previously if the methodfoowas inherited from a specialised generic typeParentType<String>, then an explicit callthis.foo()would yield aMethodAccesswhosegetMethod()accessor returned the bound methodParentType<String>.foo, whereas an implicitly-qualifiedfoo()MethodAccess‘sgetMethod()would return the unbound methodParentType.foo. Now both scenarios produce a bound method. This means that all data-flow queries may return more results where a relevant path transits a call to such an implicitly-qualified call to a member method with a bound generic type, while queries that inspect the result ofMethodAccess.getMethod()may need to tolerate bound generic methods in more circumstances. The queriesjava/iterator-remove-failure,java/non-static-nested-class,java/internal-representation-exposure,java/subtle-inherited-callandjava/deprecated-callhave been amended to properly handle calls to bound generic methods, and in some instances may now produce more results in the explicit-thiscase as well.Added taint model for arguments of
java.net.URIconstructors to the queriesjava/path-injectionandjava/path-injection-local.Added new sinks related to Android’s
AlarmManagerto the queryjava/android/implicit-pendingintents.The alert message of many queries have been changed to make the message consistent with other languages.
JavaScript/TypeScript¶
Improved how the JavaScript parser handles ambiguities between plain JavaScript and dialects such as Flow and E4X that use the same file extension. The parser now prefers plain JavaScript if possible, falling back to dialects only if the source code can not be parsed as plain JavaScript. Previously, there were rare cases where parsing would fail because the parser would erroneously attempt to parse dialect-specific syntax in a regular JavaScript file.
The
js/regexp/always-matchesquery will no longer report an empty regular expression as always matching, as this is often the intended behavior.The alert message of many queries have been changed to make the message consistent with other languages.
Python¶
The alert message of many queries have been changed to make the message consistent with other languages.
Ruby¶
The
rb/unsafe-deserializationquery now includes alerts for user-controlled data passed toHash.from_trusted_xml, since that method can deserialize YAML embedded in the XML, which in turn can result in deserialization of arbitrary objects.The alert message of many queries have been changed to make the message consistent with other languages.
New Queries¶
C/C++¶
Added a new medium-precision query,
cpp/missing-check-scanf, which detectsscanfoutput variables that are used without a proper return-value check to see that they were actually written. A variation of this query was originally contributed as an experimental query by @ihsinme.
Java/Kotlin¶
The query “Server-side template injection” (
java/server-side-template-injection) has been promoted from experimental to the main query pack. This query was originally submitted as an experimental query by @porcupineyhairs.Added a new query,
java/android/backup-enabled, to detect if Android applications allow backups.
Ruby¶
Added a new query,
rb/hardcoded-data-interpreted-as-code, to detect cases where hardcoded data is executed as code, a technique associated with backdoors.
Query Metadata Changes¶
Golang¶
Added the
security-severitytag and CWE tag to thego/insecure-hostkeycallbackquery.
Java/Kotlin¶
Removed the
@security-severitytag from several queries not in theSecurity/folder that also had missingsecuritytags.
Python¶
Added the
security-severitytag thepy/redos,py/polynomial-redos, andpy/regex-injectionqueries.
Language Libraries¶
Bug Fixes¶
C/C++¶
Fixed an issue in the taint tracking analysis where implicit reads were not allowed by default in sinks or additional taint steps that used flow states.
C#¶
Fixed an issue in the taint tracking analysis where implicit reads were not allowed by default in sinks or additional taint steps that used flow states.
Java/Kotlin¶
Fixed an issue in the taint tracking analysis where implicit reads were not allowed by default in sinks or additional taint steps that used flow states.
Python¶
Fixed an issue in the taint tracking analysis where implicit reads were not allowed by default in sinks or additional taint steps that used flow states.
Ruby¶
Fixed an issue in the taint tracking analysis where implicit reads were not allowed by default in sinks or additional taint steps that used flow states.
Breaking Changes¶
Java/Kotlin¶
The
Member.getQualifiedName()predicate result now includes the qualified name of the declaring type.
JavaScript/TypeScript¶
Many library models have been rewritten to use dataflow nodes instead of the AST. The types of some classes have been changed, and these changes may break existing code. Other classes and predicates have been renamed, in these cases the old name is still available as a deprecated feature.
The basetype of the following list of classes has changed from an expression to a dataflow node, and thus code using these classes might break. The fix to these breakages is usually to use
asExpr()to get an expression from a dataflow node, or to use.flow()to get a dataflow node from an expression.DOM.qll#WebStorageWrite
CryptoLibraries.qll#CryptographicOperation
Express.qll#Express::RequestBodyAccess
HTTP.qll#HTTP::ResponseBody
HTTP.qll#HTTP::CookieDefinition
HTTP.qll#HTTP::ServerDefinition
HTTP.qll#HTTP::RouteSetup
NoSQL.qll#NoSql::Query
SQL.qll#SQL::SqlString
SQL.qll#SQL::SqlSanitizer
HTTP.qll#ResponseBody
HTTP.qll#CookieDefinition
HTTP.qll#ServerDefinition
HTTP.qll#RouteSetup
HTTP.qll#HTTP::RedirectInvocation
HTTP.qll#RedirectInvocation
Express.qll#Express::RouterDefinition
AngularJSCore.qll#LinkFunction
Connect.qll#Connect::StandardRouteHandler
CryptoLibraries.qll#CryptographicKeyCredentialsExpr
AWS.qll#AWS::Credentials
Azure.qll#Azure::Credentials
Connect.qll#Connect::Credentials
DigitalOcean.qll#DigitalOcean::Credentials
Express.qll#Express::Credentials
NodeJSLib.qll#NodeJSLib::Credentials
PkgCloud.qll#PkgCloud::Credentials
Request.qll#Request::Credentials
ServiceDefinitions.qll#InjectableFunctionServiceRequest
SensitiveActions.qll#SensitiveVariableAccess
SensitiveActions.qll#CleartextPasswordExpr
Connect.qll#Connect::ServerDefinition
Restify.qll#Restify::ServerDefinition
Connect.qll#Connect::RouteSetup
Express.qll#Express::RouteSetup
Fastify.qll#Fastify::RouteSetup
Hapi.qll#Hapi::RouteSetup
Koa.qll#Koa::RouteSetup
Restify.qll#Restify::RouteSetup
NodeJSLib.qll#NodeJSLib::RouteSetup
Express.qll#Express::StandardRouteHandler
Express.qll#Express::SetCookie
Hapi.qll#Hapi::RouteHandler
HTTP.qll#HTTP::Servers::StandardHeaderDefinition
HTTP.qll#Servers::StandardHeaderDefinition
Hapi.qll#Hapi::ServerDefinition
Koa.qll#Koa::AppDefinition
SensitiveActions.qll#SensitiveCall
Ruby¶
import rubyno longer brings the standard Ruby AST library into scope; it instead brings a moduleAstinto scope, which must be imported. Alternatively, it is also possible to importcodeql.ruby.AST.Changed the
HTTP::Client::Requestconcept from usingMethodCallas base class, to usingDataFlow::Nodeas base class. Any class that extendsHTTP::Client::Request::Rangemust be changed, but if you only use the member predicates ofHTTP::Client::Request, no changes are required.
Major Analysis Improvements¶
Java/Kotlin¶
The virtual dispatch relation used in data flow now favors summary models over source code for dispatch to interface methods from
java.utilunless there is evidence that a specific source implementation is reachable. This should provide increased precision for any projects that include, for example, customListorMapimplementations.
JavaScript/TypeScript¶
Added support for TypeScript 4.8.
Minor Analysis Improvements¶
Java/Kotlin¶
Added new sinks to the query
java/android/implicit-pendingintentsto take into account the classesandroidx.core.app.NotificationManagerCompatandandroidx.core.app.AlarmManagerCompat.Added new flow steps for
androidx.core.app.NotificationCompatand its inner classes.Added flow sinks, sources and summaries for the Kotlin standard library.
Added flow summary for
org.springframework.data.repository.CrudRepository.save().Added new flow steps for the following Android classes:
android.content.ContentResolverandroid.content.ContentProviderClientandroid.content.ContentProviderOperationandroid.content.ContentProviderOperation$Builderandroid.content.ContentProviderResultandroid.database.Cursor
Added taint flow models for the
java.lang.String.(charAt|getBytes)methods.Improved taint flow models for the
java.lang.String.(replace|replaceFirst|replaceAll)methods. Additional results may be found where users do not properly sanitize their inputs.
JavaScript/TypeScript¶
A model for the
mermaidlibrary has been added. XSS queries can now detect flow through therendermethod of themermaidlibrary.
Python¶
Changed
CallNode.getArgByNamesuch that it has results for keyword arguments given after a dictionary unpacking argument, as thebar=2argument infunc(foo=1, **kwargs, bar=2).getStarArgmember-predicate onCallandCallNodehas been changed for calls that have multiple*argsarguments (for examplefunc(42, *my_args, *other_args)): Instead of producing no results, it will always have a result for the first such*argsargument.Reads of global/non-local variables (without annotations) inside functions defined on classes now works properly in the case where the class had an attribute defined with the same name as the non-local variable.
Ruby¶
Uses of
ActionView::FileSystemResolverare now recognized as filesystem accesses.Accesses of ActiveResource models are now recognized as HTTP requests.
Deprecated APIs¶
C/C++¶
Some classes/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
C#¶
Some classes/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
Golang¶
Some classes/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
Java/Kotlin¶
The predicate
Annotation.getAValue()has been deprecated because it might lead to obtaining the value of the wrong annotation element by accident.getValue(string)(or one of the value type specific predicates) should be used to explicitly specify the name of the annotation element.The predicate
Annotation.getAValue(string)has been renamed togetAnArrayValue(string).The predicate
SuppressWarningsAnnotation.getASuppressedWarningLiteral()has been deprecated because it unnecessarily restricts the result type;getASuppressedWarning()should be used instead.The predicates
TargetAnnotation.getATargetExpression()andRetentionAnnotation.getRetentionPolicyExpression()have been deprecated because getting the enum constant read expression is rarely useful, instead the corresponding predicates for getting the name of the referenced enum constants should be used.
JavaScript/TypeScript¶
Some classes/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
Python¶
Some unused predicates in
SsaDefinitions.qll,TObject.qll,protocols.qll, and thepointsto/folder have been deprecated.Some classes/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
Ruby¶
Some classes/modules with upper-case acronyms in their name have been renamed to follow our style-guide. The old name still exists as a deprecated alias.
New Features¶
C/C++¶
Added subclasses of
BuiltInOperationsfor__is_same,__is_function,__is_layout_compatible,__is_pointer_interconvertible_base_of,__is_array,__array_rank,__array_extent,__is_arithmetic,__is_complete_type,__is_compound,__is_const,__is_floating_point,__is_fundamental,__is_integral,__is_lvalue_reference,__is_member_function_pointer,__is_member_object_pointer,__is_member_pointer,__is_object,__is_pointer,__is_reference,__is_rvalue_reference,__is_scalar,__is_signed,__is_unsigned,__is_void, and__is_volatile.
Java/Kotlin¶
Added a new predicate,
allowsBackup, in theAndroidApplicationXmlElementclass. This predicate detects if the application element does not disable theandroid:allowBackupattribute.The predicates of the CodeQL class
Annotationhave been improved:Convenience value type specific predicates have been added, such as
getEnumConstantValue(string)orgetStringValue(string).Convenience predicates for elements with array values have been added, such as
getAnEnumConstantArrayValue(string). While the behavior of the existing predicates has not changed, usage of them should be reviewed (or replaced with the newly added predicate) to make sure they work correctly for elements with array values.Some internal CodeQL usage of the
Annotationpredicates has been adjusted and corrected; this might affect the results of some queries.
New predicates have been added to the CodeQL class
Annotatableto support getting declared and associated annotations. As part of that,hasAnnotation()has been changed to also consider inherited annotations, to be consistent withhasAnnotation(string, string)andgetAnAnnotation(). The newly added predicatehasDeclaredAnnotation()can be used as replacement for the old functionality.New predicates have been added to the CodeQL class
AnnotationTypeto simplify getting information about usage of JDK meta-annotations, such as@Retention.