mirror of
https://github.com/github/codeql.git
synced 2026-02-02 00:02:57 +01:00
5.4 KiB
5.4 KiB
0.1.0
Query Metadata Changes
- Added the
security-severitytag to several queries.
Minor Analysis Improvements
- Fixed "Local information disclosure in a temporary directory" (
java/local-temp-file-or-directory-information-disclosure) to resolve false-negatives when OS isn't properly used as logical guard. - The
SwitchCase.getRuleExpression()predicate now gets expressions for case rules with an expression on the right-hand side of the arrow belonging to bothSwitchStmtandSwitchExpr, and the correspondinggetRuleStatement()no longer returns anExprStmtin either case. PreviouslySwitchStmtandSwitchExprbehaved differently in this respect.
0.0.13
0.0.12
New Queries
- The query "Insertion of sensitive information into log files" (
java/sensitive-logging) has been promoted from experimental to the main query pack. This query was originally submitted as an experimental query by @luchua-bc.
Minor Analysis Improvements
- Updated "Local information disclosure in a temporary directory" (
java/local-temp-file-or-directory-information-disclosure) to remove false-positives when OS is properly used as logical guard.
0.0.11
0.0.10
Breaking Changes
- Add more classes to Netty request/response splitting. Change identification to
java/netty-http-request-or-response-splitting. Identify request splitting differently from response splitting in query results. Support addional classes:io.netty.handler.codec.http.CombinedHttpHeadersio.netty.handler.codec.http.DefaultHttpRequestio.netty.handler.codec.http.DefaultFullHttpRequest
New Queries
- A new query titled "Local information disclosure in a temporary directory" (
java/local-temp-file-or-directory-information-disclosure) has been added. This query finds uses of APIs that leak potentially sensitive information to other local users via the system temporary directory. This query was originally submitted as query by @JLLeitschuh.
0.0.9
New Queries
- A new query "Cleartext storage of sensitive information using a local database on Android" (
java/android/cleartext-storage-database) has been added. This query finds instances of sensitive data being stored in local databases without encryption, which may expose it to attackers or malicious applications.
0.0.8
New Queries
- A new query "Use of implicit PendingIntents" (
java/android/pending-intents) has been added. This query finds implicit and mutablePendingIntentssent to an unspecified third party component, which may provide an attacker with access to internal components of the application or cause other unintended effects. - Two new queries, "Android fragment injection" (
java/android/fragment-injection) and "Android fragment injection in PreferenceActivity" (java/android/fragment-injection-preference-activity) have been added. These queries find exported Android activities that instantiate and host fragments created from user-provided data. Such activities are vulnerable to access control bypass and expose the Android application to unintended effects. - The query "
TrustManagerthat accepts all certificates" (java/insecure-trustmanager) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @intrigus-lgtm. - The query "Log Injection" (
java/log-injection) has been promoted from experimental to the main query pack. Its results will now appear by default. The query was originally submitted as an experimental query by @porcupineyhairs and @dellalibera. - A new query "Intent URI permission manipulation" (
java/android/intent-uri-permission-manipulation) has been added. This query finds Android components that return unmodified, received Intents to the calling applications, which can provide unintended access to internal content providers of the victim application. - A new query "Cleartext storage of sensitive information in the Android filesystem" (
java/android/cleartext-storage-filesystem) has been added. This query finds instances of sensitive data being stored in local files without encryption, which may expose it to attackers or malicious applications. - The query "Cleartext storage of sensitive information using
SharedPreferenceson Android" (java/android/cleartext-storage-shared-prefs) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @luchua-bc. - The query "Unsafe certificate trust" (
java/unsafe-cert-trust) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @luchua-bc.
Query Metadata Changes
- The "Random used only once" (
java/random-used-once) query no longer has asecurity-severityscore. This has been causing some tools to categorise it as a security query, when it is more useful as a code-quality query.
0.0.7
0.0.6
0.0.5
Minor Analysis Improvements
- The
java/constant-comparisonquery no longer raises false alerts regarding comparisons with Unicode surrogate character literals.