mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
5.6 KiB
5.6 KiB
0.5.1
No user-facing changes.
0.5.0
Query Metadata Changes
- Added the
security-severitytag thepy/redos,py/polynomial-redos, andpy/regex-injectionqueries.
Minor Analysis Improvements
- The alert message of many queries have been changed to make the message consistent with other languages.
0.4.3
0.4.2
New Queries
- Added a new query,
py/suspicious-regexp-range, to detect character ranges in regular expressions that seem to match too many characters.
0.4.1
0.4.0
Breaking Changes
- Contextual queries and the query libraries they depend on have been moved to the
codeql/python-allpackage.
0.3.0
Breaking Changes
- Contextual queries and the query libraries they depend on have been moved to the
codeql/python-allpackage.
0.2.0
Major Analysis Improvements
- Improved library modeling for the query "Request without certificate validation" (
py/request-without-cert-validation), so it now also covershttpx,aiohttp.client, andurllib3.
Minor Analysis Improvements
- The query "Use of a broken or weak cryptographic algorithm" (
py/weak-cryptographic-algorithm) now reports if a cryptographic operation is potentially insecure due to use of a weak block mode.
0.1.4
0.1.3
New Queries
- The query "PAM authorization bypass due to incorrect usage" (
py/pam-auth-bypass) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @porcupineyhairs.
0.1.2
New Queries
- "XML external entity expansion" (
py/xxe). Results will appear by default. This query was based on an experimental query by @jorgectf. - "XML internal entity expansion" (
py/xml-bomb). Results will appear by default. This query was based on an experimental query by @jorgectf. - The query "CSRF protection weakened or disabled" (
py/csrf-protection-disabled) has been implemented. Its results will now appear by default.
0.1.1
0.1.0
0.0.13
0.0.12
0.0.11
New Queries
- The query "XPath query built from user-controlled sources" (
py/xpath-injection) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @porcupineyhairs.
0.0.10
New Queries
- The query "LDAP query built from user-controlled sources" (
py/ldap-injection) has been promoted from experimental to the main query pack. Its results will now appear by default. This query was originally submitted as an experimental query by @jorgectf. - The query "Log Injection" (
py/log-injection) has been promoted from experimental to the main query pack. Its results will now appear whensecurity-extendedis used. This query was originally submitted as an experimental query by @haby0.
0.0.9
Bug Fixes
- The View AST functionality no longer prints detailed information about regular expressions, greatly improving performance.
0.0.8
Major Analysis Improvements
- User names and other account information is no longer considered to be sensitive data for the queries
py/clear-text-logging-sensitive-dataandpy/clear-text-storage-sensitive-data, since this lead to many false positives.
0.0.7
0.0.6
New Queries
- Two new queries have been added for detecting Server-side request forgery (SSRF). Full server-side request forgery (
py/full-ssrf) will only alert when the URL is fully user-controlled, and Partial server-side request forgery (py/partial-ssrf) will alert when any part of the URL is user-controlled. Onlypy/full-ssrfwill be run by default.
Minor Analysis Improvements
- To support the new SSRF queries, the PyPI package
requestshas been modeled, along withhttp.client.HTTP[S]Connectionfrom the standard library.
0.0.5
Minor Analysis Improvements
- Added modeling of many functions from the
osmodule that uses file system paths, such asos.stat,os.chdir,os.mkdir, and so on. All of these are new sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Added modeling of the
tempfilemodule for creating temporary files and directories, such as the functionstempfile.NamedTemporaryFileandtempfile.TemporaryDirectory. Thesuffix,prefix, anddirarguments are all vulnerable to path-injection, and these are new sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Extended the modeling of FastAPI such that
fastapi.responses.FileResponseare consideredFileSystemAccess, making them sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Added modeling of the
posixpath,ntpath, andgenericpathmodules for path operations (although these are not supposed to be used), resulting in new sinks for the Uncontrolled data used in path expression (py/path-injection) query. - Added modeling of
wsgiref.simple_serverapplications, leading to new remote flow sources.
0.0.4
Query Metadata Changes
- Fixed the query ids of two queries that are meant for manual exploration:
python/count-untrusted-data-external-apiandpython/untrusted-data-to-external-apihave been changed topy/count-untrusted-data-external-apiandpy/untrusted-data-to-external-api.