Catch up with recent change notes

This commit is contained in:
Dave Bartolomeo
2021-11-29 16:41:18 -05:00
parent 5ed9029143
commit 9f6c0991cf
6 changed files with 30 additions and 0 deletions

View File

@@ -0,0 +1,5 @@
---
category: majorAnalysis
tags: [lgtm,codescanning]
---
* Added modeling of `wsgiref.simple_server` applications, leading to new remote flow sources.

View File

@@ -0,0 +1,5 @@
---
category: majorAnalysis
tags: [lgtm,codescanning]
---
* Added modeling of `os.stat`, `os.lstat`, `os.statvfs`, `os.fstat`, and `os.fstatvfs`, which are new sinks for the _Uncontrolled data used in path expression_ (`py/path-injection`) query.

View File

@@ -0,0 +1,5 @@
---
category: majorAnalysis
tags: [lgtm,codescanning]
---
* Added modeling of the `posixpath`, `ntpath`, and `genericpath` modules for path operations (although these are not supposed to be used), resulting in new sinks for the _Uncontrolled data used in path expression_ (`py/path-injection`) query.

View File

@@ -0,0 +1,5 @@
---
category: queryMetadata
tags: [lgtm,codescanning]
---
* Fixed the query ids of two queries that are meant for manual exploration: `python/count-untrusted-data-external-api` and `python/untrusted-data-to-external-api` have been changed to `py/count-untrusted-data-external-api` and `py/untrusted-data-to-external-api`.

View File

@@ -0,0 +1,5 @@
---
category: newQuery
tags: [lgtm,codescanning]
---
* A new query (`rb/csrf-protection-disabled`) has been added. The query finds cases where cross-site forgery protection is explictly disabled.

View File

@@ -0,0 +1,5 @@
---
category: newQuery
tags: [lgtm,codescanning]
---
* A new query (`rb/request-forgery`) has been added. The query finds HTTP requests made with user-controlled URLs.