From 6ddbed7d95bada014614548823750c2d27e2cea9 Mon Sep 17 00:00:00 2001 From: Mark Shannon Date: Fri, 25 Jan 2019 11:34:41 +0000 Subject: [PATCH] Python: Minor tweaks to qldoc and release note. --- change-notes/1.20/analysis-python.md | 4 ++-- .../ql/src/Security/CWE-020/IncompleteHostnameRegExp.qhelp | 5 ++--- .../CWE-020/examples/IncompleteUrlSubstringSanitization.py | 4 ++++ 3 files changed, 8 insertions(+), 5 deletions(-) diff --git a/change-notes/1.20/analysis-python.md b/change-notes/1.20/analysis-python.md index ed7d8e1a72a..27cb554eb8c 100644 --- a/change-notes/1.20/analysis-python.md +++ b/change-notes/1.20/analysis-python.md @@ -14,9 +14,9 @@ Removes false positives seen when using Python 3.6, but not when using earlier v | **Query** | **Tags** | **Purpose** | |-----------------------------|-----------|--------------------------------------------------------------------| | Default version of SSL/TLS may be insecure (`py/insecure-default-protocol`) | security, external/cwe/cwe-327 | Finds instances where an insecure default protocol may be used. Results are shown on LGTM by default. | -| Use of insecure SSL/TLS version (`py/insecure-protocol`) | security, external/cwe/cwe-327 | Finds instances where a known insecure protocol has been specified. Results are shown on LGTM by default. | -| Incomplete regular expression for hostnames (`py/incomplete-hostname-regexp`) | security, external/cwe/cwe-020 | Finds instances where a hostname is incompletely sanitized due to enescaped character in a regular expression. Results are shown on LGTM by default. | +| Incomplete regular expression for hostnames (`py/incomplete-hostname-regexp`) | security, external/cwe/cwe-020 | Finds instances where a hostname is incompletely sanitized because a regular expression contains an unescaped character. Results are shown on LGTM by default. | | Incomplete URL substring sanitization (`py/incomplete-url-substring-sanitization`) | security, external/cwe/cwe-020 | Finds instances where a URL is incompletely sanitized due to insufficient checks. Results are shown on LGTM by default. | +| Use of insecure SSL/TLS version (`py/insecure-protocol`) | security, external/cwe/cwe-327 | Finds instances where a known insecure protocol has been specified. Results are shown on LGTM by default. | ## Changes to existing queries diff --git a/python/ql/src/Security/CWE-020/IncompleteHostnameRegExp.qhelp b/python/ql/src/Security/CWE-020/IncompleteHostnameRegExp.qhelp index 346923da021..b542ae252eb 100644 --- a/python/ql/src/Security/CWE-020/IncompleteHostnameRegExp.qhelp +++ b/python/ql/src/Security/CWE-020/IncompleteHostnameRegExp.qhelp @@ -56,9 +56,8 @@
- This vulnerability is addressed in the safe check, which
- escapes the . and will reject wwwXexample.com.
-
+ The safe check closes this vulnerability by escaping the .
+ so that URLs of the form wwwXexample.com are rejected.