mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
63 lines
6.0 KiB
Markdown
63 lines
6.0 KiB
Markdown
# Improvements to JavaScript analysis
|
|
|
|
## General improvements
|
|
|
|
* Support for the following frameworks and libraries has been improved:
|
|
- [koa](https://github.com/koajs/koa)
|
|
- [socket.io](http://socket.io)
|
|
- [Node.js](http://nodejs.org)
|
|
- [Firebase](https://firebase.google.com/)
|
|
- [Express](https://expressjs.com/)
|
|
- [shelljs](https://www.npmjs.com/package/shelljs)
|
|
- [cheerio](https://www.npmjs.com/package/cheerio)
|
|
|
|
* The security queries now track data flow through Base64 decoders such as the Node.js `Buffer` class, the DOM function `atob`, and a number of npm packages including [`abab`](https://www.npmjs.com/package/abab), [`atob`](https://www.npmjs.com/package/atob), [`btoa`](https://www.npmjs.com/package/btoa), [`base-64`](https://www.npmjs.com/package/base-64), [`js-base64`](https://www.npmjs.com/package/js-base64), [`Base64.js`](https://www.npmjs.com/package/Base64) and [`base64-js`](https://www.npmjs.com/package/base64-js).
|
|
|
|
* The security queries now track data flow through exceptions.
|
|
|
|
* The security queries now treat comparisons with symbolic constants as sanitizers, resulting in fewer false positive results.
|
|
|
|
* TypeScript 3.5 is now supported.
|
|
|
|
* On LGTM, TypeScript projects now have static type information extracted by default, resulting in more security results.
|
|
Users of the command-line tools must still pass `--typescript-full` to the extractor to enable this.
|
|
|
|
|
|
## New queries
|
|
|
|
| **Query** | **Tags** | **Purpose** |
|
|
|-----------------------------------------------|------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|
| Missing regular expression anchor (`js/regex/missing-regexp-anchor`) | correctness, security, external/cwe/cwe-20 | Highlights regular expression patterns that may be missing an anchor, indicating a possible violation of [CWE-20](https://cwe.mitre.org/data/definitions/20.html). Results are not shown on LGTM by default. |
|
|
| Prototype pollution (`js/prototype-pollution`) | security, external/cwe-250, external/cwe-400 | Highlights code that allows an attacker to modify a built-in prototype object through an unsanitized recursive merge function. Results are not shown on [LGTM](https://lgtm.com/rules/1508857356317/) by default. |
|
|
|
|
## Changes to existing queries
|
|
|
|
| **Query** | **Expected impact** | **Change** |
|
|
|--------------------------------|------------------------------|---------------------------------------------------------------------------|
|
|
| Arbitrary file write during zip extraction ("Zip Slip") | More results | This rule now considers more libraries, including tar as well as zip. |
|
|
| Client-side URL redirect | More results and fewer false-positive results | This rule now recognizes additional uses of the document URL. It also treats URLs as safe in more cases where the hostname cannot be tampered with. |
|
|
| Double escaping or unescaping | More results | This rule now considers the flow of regular expressions literals. |
|
|
| Expression has no effect | Fewer false-positive results | This rule now treats uses of `Object.defineProperty` more conservatively. |
|
|
| Incomplete regular expression for hostnames | More results | This rule now tracks regular expressions for host names further. |
|
|
| Incomplete string escaping or encoding | More results | This rule now considers the flow of regular expressions literals, and it no longer flags the removal of trailing newlines. |
|
|
| Incorrect suffix check | Fewer false-positive results | This rule now recognizes valid checks in more cases. |
|
|
| Password in configuration file | Fewer false positive results | This query now excludes passwords that are inserted into the configuration file using a templating mechanism or read from environment variables. Results are no longer shown on LGTM by default. |
|
|
| Replacement of a substring with itself | More results | This rule now considers the flow of regular expressions literals. |
|
|
| Server-side URL redirect | Fewer false-positive results | This rule now treats URLs as safe in more cases where the hostname cannot be tampered with. |
|
|
| Tainted path | More results and fewer false-positive results | This rule now analyzes path manipulation code more precisely. |
|
|
| Type confusion through parameter tampering | Fewer false-positive results | This rule now recognizes additional emptiness checks. |
|
|
| Useless assignment to property | Fewer false-positive results | This rule now ignores reads of additional getters. |
|
|
| Unreachable statement | Unreachable throws no longer give an alert | This ignores unreachable throws, as they could be intentional (for example, to placate the TS compiler). |
|
|
|
|
|
|
## Changes to QL libraries
|
|
|
|
* `RegExpLiteral` is now a `DataFlow::SourceNode`.
|
|
* `JSDocTypeExpr` now has source locations and is a subclass of `Locatable` and `TypeAnnotation`.
|
|
* The two-parameter versions of predicate `isBarrier` in `DataFlow::Configuration` and of predicate `isSanitizer` in `TaintTracking::Configuration` have been renamed to `isBarrierEdge` and `isSanitizerEdge`, respectively. The old names are maintained for backwards-compatibility in this version, but will be deprecated in the next version and subsequently removed.
|
|
* Various predicates named `getTypeAnnotation()` now return `TypeAnnotation` instead of `TypeExpr`.
|
|
In rare cases, this may cause compilation errors in existing code. Cast the result to `TypeExpr` if this happens.
|
|
* The `getALabel` predicate in `LabeledBarrierGuardNode` and `LabeledSanitizerGuardNode`
|
|
has been deprecated and overriding it no longer has any effect.
|
|
Instead use the 3-parameter version of `blocks` or `sanitizes`.
|