Files
codeql/java/ql/lib/change-notes/released/9.1.0.md
2026-05-05 09:34:30 +00:00

1.9 KiB

9.1.0

New Features

Minor Analysis Improvements

  • Added sql-injection sink models for the Hibernate org.hibernate.query.QueryProducer methods createNativeMutationQuery, createMutationQuery, and createSelectionQuery.
  • The java/partial-path-traversal and java/partial-path-traversal-from-remote queries now correctly recognize file separator appends using +=.
  • The java/path-injection and java/zipslip queries now recognize Path.toRealPath() as a path normalization sanitizer, consistent with the existing treatment of Path.normalize() and File.getCanonicalPath(). This reduces false positives for code that uses the NIO.2 API for path canonicalization.
  • The java/sensitive-log query now excludes additional common variable naming patterns that do not hold sensitive data, reducing false positives. This includes pagination/iteration tokens (nextToken, pageToken, continuationToken), token metadata (tokenType, tokenEndpoint, tokenCount), and secret metadata (secretName, secretId, secretVersion).
  • The java/sensitive-log query now treats method calls whose names contain "encrypt", "hash", or "digest" as sanitizers, consistent with the existing treatment in java/cleartext-storage-in-log. This reduces false positives when sensitive data is hashed or encrypted before logging.
  • The java/trust-boundary-violation query now recognizes regular expression checks (including String.matches() guards and @javax.validation.constraints.Pattern annotations) as sanitizers, consistent with the existing treatment of ESAPI validators. This reduces false positives when input is validated against a pattern before being stored in a session.