Semmle 1.22
Skip to end of metadata
Go to start of metadata

On this page:

HIDDEN

Analysis in all applications

The following changes in version 1.19 affect JavaScript analysis in all applications.


General improvements to code extraction

  • On LGTM, files whose name ends in .min.js or -min.js are no longer extracted by default. These files usually contain minified code and any alerts in these files would be hidden by default. If you still want to extract code from these files, you can add the following filters to your lgtm.yml file (or add them to existing filters):
 extraction:
  javascript:
    index:
      filters:
        - include: "**/*.min.js"
        - include: "**/*-min.js"

 
  • The TypeScript compiler is now included in the LGTM Enterprise and QL command-line tools installations, and you no longer need to install it manually. If you need to override the compiler version, set the SEMMLE_TYPESCRIPT_HOME environment variable to point to an installation of the typescript NPM package.

  • The extractor now supports:

General improvements to analysis

  • Modeling of taint flow through array and buffer operations has been improved. This may give additional results for the security queries.

  • Support for AMD modules has been improved. This may give additional results for the security queries, as well as any queries that use type inference on code bases that use such modules.

  • Support for popular libraries has been improved. Consequently, queries may produce more results on code bases that use the following features:

  • File system access, for example, through fs-extra or globby
  • Outbound network access, for example, through the fetch API
  • The lodash, underscore, async and async-es libraries
  • The taint tracking library now recognizes additional sanitization patterns. This may give fewer false-positive results for the security queries.

  • Type inference for function calls has been improved. This may give additional results for queries that rely on type inference.

  • Path explanations have been added to the relevant security queries. Use QL for Eclipse to run queries and explore the data flow in results.

New LGTM queries

Query Tags Purpose
Hard-coded data interpreted as code (js/hardcoded-data-interpreted-as-code) security, external/cwe/cwe-506 Highlights locations where hard-coded data is transformed and then executed as code or interpreted as an import path, which may indicate embedded malicious code (CWE-506). Results are hidden on LGTM by default.
Host header poisoning in email generation (js/host-header-forgery-in-email-generation) security, external/cwe/cwe-640 Highlights code that generates emails with links that can be hijacked by HTTP host header poisoning, indicating a potential violation of CWE-640. Results shown on LGTM by default.
Replacement of a substring with itself (js/identity-replacement) correctness, security, external/cwe/cwe-116 Highlights string replacements that replace a string with itself, which usually indicates a mistake. Results shown on LGTM by default.
Stored cross-site scripting (js/stored-xss) security, external/cwe/cwe-079, external/cwe/cwe-116 Highlights uncontrolled stored values flowing into HTML content, indicating a potential violation of CWE-079. Results shown on LGTM by default.
Unclear precedence of nested operators (js/unclear-operator-precedence) maintainability, correctness, external/cwe/cwe-783 Highlights nested binary operators whose relative precedence is easy to misunderstand. Results shown on LGTM by default.
Unneeded defensive code (js/unneeded-defensive-code) correctness, external/cwe/cwe-570, external/cwe/cwe-571 Highlights locations where defensive code is not needed. Results are shown on LGTM by default.
Unsafe dynamic method access (js/unsafe-dynamic-method-access ) security, external/cwe/cwe-094 Highlights code that invokes a user-controlled method on an object with unsafe methods. Results are shown on LGTM by default.
Unvalidated dynamic method access (js/unvalidated-dynamic-method-call ) security, external/cwe/cwe-754 Highlights code that invokes a user-controlled method without guarding against exceptional circumstances. Results are shown on LGTM by default.
Useless assignment to property (js/useless-assignment-to-property) maintainability Highlights property assignments whose value is always overwritten. Results are shown on LGTM by default.

Changes to existing queries

Query Expected impact Change
Ambiguous HTML id attribute (js/duplicate-html-id) Lower severity Severity revised to “warning”.
Clear-text logging of sensitive information (js/clear-text-logging) Fewer results Query now tracks flow more precisely.
Client side cross-site scripting (js/xss) More results HTML injection in the body of an email is also highlighted.
Client-side URL redirect (js/client-side-unvalidated-url-redirection) Fewer false positive results Safe redirects recognized in more cases.
Conflicting HTML element attributes (js/conflicting-html-attribute) Lower severity Severity revised to “warning”.
Duplicate ‘if’ condition (js/duplicate-condition) Lower severity Severity revised to “warning”.
Duplicate switch case (js/duplicate-switch-case) Lower severity Severity revised to “warning”.
Inconsistent use of ‘new’ (js/inconsistent-use-of-new) Simpler result presentation Results show one call with new and one without.
Information exposure through a stack trace (js/stack-trace-exposure) More results Cases where the entire exception object (including the stack trace) may be exposed are highlighted.
Missing ‘this’ qualifier (js/missing-this-qualifier) Fewer false positive results Additional intentional calls to global functions are recognized.
Missing CSRF middleware (js/missing-token-validation) Fewer false positive results Additional types of CSRF protection middleware are recognized.
Missing variable declaration (js/missing-variable-declaration) Lower severity Severity revised to “warning”.
Regular expression injection (js/regex-injection) Fewer false positive results Calls to String.prototype.search are identified with more precision.
Remote property injection (js/remote-property-injection) Fewer results No longer highlights dynamic method calls, which are now handled by two new queries: js/unsafe-dynamic-method-access and js/unvalidated-dynamic-method-call. The precision of this rule has been revised to “medium”, reflecting the precision of the remaining results. Results are now hidden on LGTM by default.
Self assignment (js/redundant-assignment) Fewer false positive results Self-assignments preceded by a JSDoc comment with a @type tag are no longer highlighted.
Server-side URL redirect (js/server-side-unvalidated-url-redirection) More results and fewer false positive results More redirection calls are identified. More safe redirections are recognized and ignored.
Unbound event handler receiver (js/unbound-event-handler-receiver) Fewer false positive results Additional ways that class methods can be bound are recognized.
Uncontrolled data used in network request (js/request-forgery) More results Additional kinds of requests are identified.
Unknown directive (js/unknown-directive) Fewer false positives results YUI compressor directives are now recognized.
Unused variable, import, function or class (js/unused-local-variable) Fewer false positive results and fewer results Imports used by the transform-react-jsx Babel plugin and fewer variables that may be used by eval calls are highlighted. Only one result is reported for an import statement with multiple unused imports.
Useless assignment to local variable (js/useless-assignment-to-local) Fewer false positive results Additional ways default values can be set are recognized.
Useless conditional (js/trivial-conditional) More results, fewer false positive results More types of conditional are recognized. Additional defensive coding patterns are now ignored.
Whitespace contradicts operator precedence (js/whitespace-contradicts-precedence) Fewer false positive results Operators with asymmetric whitespace are no longer highlighted.
Wrong use of ‘this’ for static method (js/mixed-static-instance-this-access) More results, fewer false-positive results Inherited methods are now identified.

Changes to QL libraries

  • A DataFlow::ParameterNode instance now exists for all function parameters. Previously, unused parameters did not have a corresponding data-flow node.

  • ReactComponent::getAThisAccess has been renamed to getAThisNode. The old name is still usable but is deprecated. It no longer gets individual this expressions, but the ThisNode mentioned below.

  • The DataFlow::ThisNode class now corresponds to the implicit receiver parameter of a function, as opposed to an individual this expression. This means that getALocalSource now maps all this expressions within a given function to the same source. The data-flow node associated with a ThisExpr can no longer be cast to DataFlow::SourceNode or DataFlow::ThisNode. Using getALocalSource before casting, or instead of casting, is recommended.

  • The flow configuration framework now supports distinguishing and tracking different kinds of taint, specified by an extensible class FlowLabel (which can also be referred to by its alias TaintKind).


Additional changes for analysis in QL tools and applications only

The following changes in this version affect JavaScript analysis only in QL for Eclipse, and the QL command-line tools.


Other new queries

Query Tags Purpose
Enabling Node.js integration for Electron web content renderers (js/enabling-electron-renderer-node-integration) security, frameworks/electron, external/cwe/cwe-094 Highlights Electron web content renderer preferences with Node.js integration enabled, indicating a potential violation of CWE-94.
File data in outbound network request (js/file-access-to-http) security, external/cwe/cwe-200 Highlights locations where file data is sent in a network request, indicating a potential violation of CWE-200.
User-controlled data written to file (js/http-to-file-access) security, external/cwe/cwe-434, external/cwe/cwe-912 Highlights locations where user-controlled data is written to a file, indicating a potential violation of CWE-912.

  • No labels