18 KiB
1.7.3
No user-facing changes.
1.7.2
No user-facing changes.
1.7.1
No user-facing changes.
1.7.0
Query Metadata Changes
- Reduced the
security-severityscore of thepy/overly-large-rangequery from 5.0 to 4.0 to better reflect its impact.
1.6.8
Minor Analysis Improvements
- The
py/insecure-cookiequery has been split into multiple queries; withpy/insecure-cookiechecking for cases in whichSecureflag is not set,py/client-exposed-cookiechecking for cases in which theHttpOnlyflag is not set, and thepy/samesite-nonequery checking for cases in which theSameSiteattribute is set toNone. These queries also now only alert for cases in which the cookie is detected to contain sensitive data.
1.6.7
No user-facing changes.
1.6.6
Minor Analysis Improvements
- The queries that check for unmatchable
$and^in regular expressions did not account correctly for occurrences inside lookahead and lookbehind assertions. These occurrences are now handled correctly, eliminating this source of false positives.
- The
py/inheritance/signature-mismatchquery has been modernized. It produces more precise results and more descriptive alert messages. - The
py/inheritance/incorrect-overriding-signaturequery has been deprecated. Its results have been consolidated into thepy/inheritance/signature-mismatchquery.
1.6.5
Minor Analysis Improvements
- The queries
py/missing-call-to-init,py/missing-calls-to-del,py/multiple-calls-to-init, andpy/multiple-calls-to-delqueries have been modernized; no longer relying on outdated libraries, producing more precise results with more descriptive alert messages, and improved documentation.
1.6.4
Minor Analysis Improvements
- The
py/unexpected-raise-in-special-methodquery has been modernized. It produces additional results in cases where the exception is only raised conditionally. Its precision has been changed fromvery-hightohigh. - The queries
py/incomplete-ordering,py/inconsistent-equality, andpy/equals-hash-mismatchhave been modernized; no longer relying on outdated libraries, improved documentation, and no longer producing alerts for problems specific to Python 2.
1.6.3
No user-facing changes.
1.6.2
No user-facing changes.
1.6.1
No user-facing changes.
1.6.0
Query Metadata Changes
- The tag
qualityhas been added to multiple Python quality queries for consistency. They have all been given a tag for one of the two top-level categoriesreliabilityormaintainability, and a tag for a sub-category. See Query file metadata and alert message style guide for more information about these categories.
Minor Analysis Improvements
- The
py/iter-returns-non-selfquery has been modernized, and no longer alerts for certain cases where an equivalent iterator is returned.
1.5.2
Minor Analysis Improvements
- Added SQL injection models from the
pandasPyPI package.
1.5.1
Minor Analysis Improvements
- The query
py/hardcoded-credentialshas been removed from all query suites.
1.5.0
Query Metadata Changes
- The tags
security/cwe/cwe-94andsecurity/cwe/cwe-95have been removed frompy/use-of-inputand the tagsexternal/cwe/cwe-094andexternal/cwe/cwe-095have been added. - The tag
external/cwe/cwe-20has been removed frompy/count-untrusted-data-external-apiand the tagexternal/cwe/cwe-020has been added. - The tag
external/cwe/cwe-20has been removed frompy/untrusted-data-to-external-apiand the tagexternal/cwe/cwe-020has been added. - The tag
external/cwe/cwe-20has been removed frompy/cookie-injectionand the tagexternal/cwe/cwe-020has been added. - The tag
external/cwe/cwe-20has been removed frompy/incomplete-url-substring-sanitizationand the tagexternal/cwe/cwe-020has been added. - The tag
external/cwe/cwe-94has been removed frompy/js2py-rceand the tagexternal/cwe/cwe-094has been added.
1.4.8
No user-facing changes.
1.4.7
Minor Analysis Improvements
- The
py/mixed-tuple-returnsquery no longer flags instances where the tuple is passed into the function as an argument, as this led to too many false positives.
1.4.6
Minor Analysis Improvements
- The
py/special-method-wrong-signaturehas been modernized and rewritten to no longer rely on outdated APIs. Moreover, the query no longer flags cases where a default value is never used, as these alerts were rarely useful.
Bug Fixes
- The
py/unused-global-variablenow no longer flags variables that are only used in forward references (e.g. theFooindef bar(x: "Foo"): ...).
1.4.5
No user-facing changes.
1.4.4
No user-facing changes.
1.4.3
No user-facing changes.
1.4.2
No user-facing changes.
1.4.1
No user-facing changes.
1.4.0
New Queries
- The Server Side Template Injection query (
py/template-injection), originally contributed to the experimental query pack by @porcupineyhairs, has been promoted to the main query suite. This query finds instances of templates for a template engine such as Jinja being constructed with user input.
1.3.4
No user-facing changes.
1.3.3
No user-facing changes.
1.3.2
Minor Analysis Improvements
- Improved modelling for the
pycurlframework.
1.3.1
No user-facing changes.
1.3.0
New Queries
- The experimental
py/cors-misconfiguration-with-credentialsquery, which finds insecure CORS middleware configurations.
1.2.2
Minor Analysis Improvements
- The
py/clear-text-logging-sensitive-dataandpy/clear-text-storage-sensitive-dataqueries have been updated to exclude thecertificateclassification of sensitive sources, which often do not contain sensitive data.
1.2.1
No user-facing changes.
1.2.0
New Queries
- The
py/cookie-injectionquery, originally contributed to the experimental query pack by @jorgectf, has been promoted to the main query pack. This query finds instances of cookies being set without theSecure,HttpOnly, orSameSiteattributes set to secure values.
1.1.0
New Queries
- The
py/cookie-injectionquery, originally contributed to the experimental query pack by @jorgectf, has been promoted to the main query pack. This query finds instances of cookies being constructed from user input.
Minor Analysis Improvements
- Added models of
streamlitPyPI package.
1.0.4
No user-facing changes.
1.0.3
Minor Analysis Improvements
- Adding Python support for Hardcoded Credentials as Models as Data
- Additional sanitizers have been added to the
py/full-ssrfandpy/partial-ssrfqueries for methods that verify a string contains only a certain set of characters, such as.isalnum()as well as regular expression tests.
1.0.2
No user-facing changes.
1.0.1
Minor Analysis Improvements
- Added models for
opmllibrary.
1.0.0
Breaking Changes
- CodeQL package management is now generally available, and all GitHub-produced CodeQL packages have had their version numbers increased to 1.0.0.
Minor Analysis Improvements
- Added models of
gradioPyPI package.
0.9.16
New Queries
- The
py/header-injectionquery, originally contributed to the experimental query pack by @jorgectf, has been promoted to the main query pack and renamed topy/http-response-splitting. This query finds instances of http header injection / response splitting vulnerabilities.
0.9.15
No user-facing changes.
0.9.14
No user-facing changes.
0.9.13
No user-facing changes.
0.9.12
No user-facing changes.
0.9.11
No user-facing changes.
0.9.10
New Queries
- The query
py/nosql-injectionfor finding NoSQL injection vulnerabilities is now part of the default security suite.
0.9.9
No user-facing changes.
0.9.8
No user-facing changes.
0.9.7
Minor Analysis Improvements
- Added modeling of YARL's
is_absolutemethod and checks of thenetlocof a parsed URL as sanitizers for thepy/url-redirectionquery, leading to fewer false positives.
0.9.6
No user-facing changes.
0.9.5
No user-facing changes.
0.9.4
No user-facing changes.
0.9.3
Minor Analysis Improvements
- Added modeling of more
FileSystemAccessin packagescherrypy,aiofile,aiofiles,anyio,sanic,starlette,baize, andio. This will mainly affect the Uncontrolled data used in path expression (py/path-injection) query.
0.9.2
No user-facing changes.
0.9.1
No user-facing changes.
0.9.0
New Queries
- The query
py/nosql-injectionfor finding NoSQL injection vulnerabilities is now available in the default security suite.
Minor Analysis Improvements
- Improved URL redirection from remote source (
py/url-redirection) query to not alert when URL has been checked withdjango.utils.http. url_has_allowed_host_and_scheme. - Extended the
py/command-line-injectionquery with sinks from Python'sasynciomodule.
0.8.5
No user-facing changes.
0.8.4
Minor Analysis Improvements
- Improved Reflected server-side cross-site scripting (
py/reflective-xss) query to not alert on data passed toflask.jsonify. Since these HTTP responses are returned with mime-typeapplication/json, they do not pose a security risk for XSS. - Updated path explanations for
@kind path-problemqueries to always include left hand side of assignments, making paths easier to understand.
0.8.3
No user-facing changes.
0.8.2
No user-facing changes.
0.8.1
Minor Analysis Improvements
- Fixed modeling of
aiohttp.ClientSessionso we properly handleasync withuses. This can impact results of server-side request forgery queries (py/full-ssrf,py/partial-ssrf).
0.8.0
Bug Fixes
- The query "Arbitrary file write during archive extraction ("Zip Slip")" (
py/zipslip) has been renamed to "Arbitrary file access during archive extraction ("Zip Slip")."
0.7.4
No user-facing changes.
0.7.3
Bug Fixes
- The display name (
@name) of thepy/unsafe-deserializationquery has been updated in favor of consistency with other languages.
0.7.2
No user-facing changes.
0.7.1
No user-facing changes.
0.7.0
Bug Fixes
- Nonlocal variables are excluded from alerts.
0.6.6
No user-facing changes.
0.6.5
New Queries
- Added a new query,
py/shell-command-constructed-from-input, to detect libraries that unsafely construct shell commands from their inputs.
0.6.4
No user-facing changes.
0.6.3
No user-facing changes.
0.6.2
No user-facing changes.
0.6.1
No user-facing changes.
0.6.0
Minor Analysis Improvements
- The
analysis/AlertSuppression.qlquery has moved to the root folder. Users that refer to this query by path should update their configurations. The query has been updated to support the new# codeql[query-id]supression comments. These comments can be used to suppress an alert and must be placed on a blank line before the alert. In addition the legacy# lgtmand# lgtm[query-id]comments can now also be placed on the line before an alert. - Bumped the minimum keysize we consider secure for elliptic curve cryptography from 224 to 256 bits, following current best practices. This might effect results from the Use of weak cryptographic key (
py/weak-crypto-key) query. - Added modeling of
getpass.getpassas a source of passwords, which will be an additional source forpy/clear-text-logging-sensitive-data,py/clear-text-storage-sensitive-data, andpy/weak-sensitive-data-hashing.
0.5.6
No user-facing changes.
0.5.5
No user-facing changes.
0.5.4
No user-facing changes.
0.5.3
No user-facing changes.
0.5.2
Minor Analysis Improvements
- Added model of
cx_Oracle,oracledb,phonenixdbandpyodbcPyPI packages as a SQL interface following PEP249, resulting in additional sinks forpy/sql-injection. - Added model of
executemanycalls on PEP-249 compliant database APIs, resulting in additional sinks forpy/sql-injection. - Added model of
pymssqlPyPI package as a SQL interface following PEP249, resulting in additional sinks forpy/sql-injection. - The alert messages of many queries were changed to better follow the style guide and make the messages consistent with other languages.
Bug Fixes
- Fixed how
flask.requestis modeled as a RemoteFlowSource, such that we show fewer duplicated alert messages for Code Scanning alerts. The import, such asfrom flask import request, will now be shown as the first step in a path explanation.
0.5.1
No user-facing changes.
0.5.0
Query Metadata Changes
- Added the
security-severitytag thepy/redos,py/polynomial-redos, andpy/regex-injectionqueries.
Minor Analysis Improvements
- The alert message of many queries have been changed to make the message consistent with other languages.
0.4.3
0.4.2
New Queries
- Added a new query,
py/suspicious-regexp-range, to detect character ranges in regular expressions that seem to match too many characters.
0.4.1
0.4.0
Breaking Changes
- Contextual queries and the query libraries they depend on have been moved to the
codeql/python-allpackage.
0.3.0
Breaking Changes
- Contextual queries and the query libraries they depend on have been moved to the
codeql/python-allpackage.
0.2.0
Major Analysis Improvements
- Improved library modeling for the query "Request without certificate validation" (
py/request-without-cert-validation), so it now also covershttpx,aiohttp.client, andurllib3.
Minor Analysis Improvements
- The query "Use of a broken or weak cryptographic algorithm" (
py/weak-cryptographic-algorithm) now reports if a cryptographic operation is potentially insecure due to use of a weak block mode.
0.1.4
0.1.3
New Queries
- The query "PAM authorization bypass due to incorrect usage" (
py/pam-auth-bypass) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @porcupineyhairs.
0.1.2
New Queries
- "XML external entity expansion" (
py/xxe). Results will appear by default. This query was based on an experimental query by @jorgectf. - "XML internal entity expansion" (
py/xml-bomb). Results will appear by default. This query was based on an experimental query by @jorgectf. - The query "CSRF protection weakened or disabled" (
py/csrf-protection-disabled) has been implemented. Its results will now appear by default.
0.1.1
0.1.0
0.0.13
0.0.12
0.0.11
New Queries
- The query "XPath query built from user-controlled sources" (
py/xpath-injection) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @porcupineyhairs.
0.0.10
New Queries
- The query "LDAP query built from user-controlled sources" (
py/ldap-injection) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @jorgectf. - The query "Log Injection" (
py/log-injection) has been promoted from experimental to the main query pack. Its results will now appear whensecurity-extendedis used. This query was originally submitted as an experimental query by @haby0.
0.0.9
Bug Fixes
- The View AST functionality no longer prints detailed information about regular expressions, greatly improving performance.
0.0.8
Major Analysis Improvements
- User names and other account information is no longer considered to be sensitive data for the queries
py/clear-text-logging-sensitive-dataandpy/clear-text-storage-sensitive-data, since this lead to many false positives.
0.0.7
0.0.6
New Queries
- Two new queries have been added for detecting Server-side request forgery (SSRF). Full server-side request forgery (
py/full-ssrf) will only alert when the URL is fully user-controlled, and Partial server-side request forgery (py/partial-ssrf) will alert when any part of the URL is user-controlled. Onlypy/full-ssrfwill be run by default.
Minor Analysis Improvements
- To support the new SSRF queries, the PyPI package
requestshas been modeled, along withhttp.client.HTTP[S]Connectionfrom the standard library.
0.0.5
Minor Analysis Improvements
- Added modeling of many functions from the
osmodule that uses file system paths, such asos.stat,os.chdir,os.mkdir, and so on. All of these are new sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Added modeling of the
tempfilemodule for creating temporary files and directories, such as the functionstempfile.NamedTemporaryFileandtempfile.TemporaryDirectory. Thesuffix,prefix, anddirarguments are all vulnerable to path-injection, and these are new sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Extended the modeling of FastAPI such that
fastapi.responses.FileResponseare consideredFileSystemAccess, making them sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Added modeling of the
posixpath,ntpath, andgenericpathmodules for path operations (although these are not supposed to be used), resulting in new sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Added modeling of
wsgiref.simple_serverapplications, leading to new remote flow sources.
0.0.4
Query Metadata Changes
- Fixed the query ids of two queries that are meant for manual exploration:
python/count-untrusted-data-external-apiandpython/untrusted-data-to-external-apihave been changed topy/count-untrusted-data-external-apiandpy/untrusted-data-to-external-api.