Skip to content

Commit f815152

Browse files
author
Alvaro Muñoz
authored
Merge pull request #12 from GitHubSecurityLab/rename_query_ids
Rename query IDs
2 parents d2cd3bc + 87e2257 commit f815152

File tree

68 files changed

+197
-166
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+197
-166
lines changed

csharp/src/audit/CWE-078/CommandInjectionAudit.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
* @problem.severity error
77
* @security-severity 2.0
88
* @precision low
9-
* @id cs/audit/command-line-injection
9+
* @id githubsecuritylab/audit/command-line-injection
1010
* @tags security
1111
* external/cwe/cwe-078
1212
* external/cwe/cwe-088

csharp/src/audit/CWE-094/CodeInjectionAudit.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
* @problem.severity warning
77
* @security-severity 2.0
88
* @precision low
9-
* @id cs/audit/code-injection
9+
* @id githubsecuritylab/audit/code-injection
1010
* @tags security
1111
* external/cwe/cwe-094
1212
* external/cwe/cwe-095

csharp/src/audit/CWE-502/UnsafeDeserializationAudit.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* @description Calling an unsafe deserializer with data controlled by an attacker
44
* can lead to denial of service and other security problems.
55
* @kind problem
6-
* @id cs/audit/unsafe-deserialization
6+
* @id githubsecuritylab/audit/unsafe-deserialization
77
* @problem.severity warning
88
* @security-severity 2.0
99
* @precision low
@@ -12,7 +12,6 @@
1212
* audit
1313
*/
1414

15-
// https://github.com/advanced-security/codeql-queries/blob/audit-csharp/codeql/csharp/ql/src/Security Features/CWE-502/UnsafeDeserialization.ql
1615
import csharp
1716
import semmle.code.csharp.security.dataflow.UnsafeDeserializationQuery
1817

csharp/src/audit/CWE-611/UnsafeXMLResolverAudit.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,14 @@
66
* @problem.severity warning
77
* @security-severity 2.0
88
* @precision low
9-
* @id cs/audit/insecure-xml-read
9+
* @id githubsecuritylab/audit/insecure-xml-read
1010
* @tags security
1111
* external/cwe/cwe-611
1212
* external/cwe/cwe-827
1313
* external/cwe/cwe-776
1414
* audit
1515
*/
1616

17-
// https://github.com/advanced-security/codeql-queries/blob/c8cfb6a0cc44da3d2baae4b985262a84652f71ee/csharp/ql/src/Security Features/CWE-611/UseXmlSecureResolver.ql#L22s
1817
import csharp
1918
import semmle.code.csharp.security.xml.InsecureXMLQuery
2019

csharp/src/library_sources/ExternalAPIsUsedWithUntrustedData.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* @description This reports the external APIs that are used with untrusted data, along with how
44
* frequently the API is called, and how many unique sources of untrusted data flow
55
* to it.
6-
* @id cs/count-untrusted-data-external-api
6+
* @id githubsecuritylab/count-untrusted-data-external-api
77
* @kind table
88
* @tags security external/cwe/cwe-20
99
*/

csharp/src/security/CWE-328/WeakHashingAlgorithms.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
* @security-severity 5.0
77
* @sub-severity medium
88
* @precision medium
9-
* @id cs/weak-cryptographic-hash-algorithms
9+
* @id githubsecuritylab/weak-cryptographic-hash-algorithms
1010
* @tags security
1111
* audit
1212
* external/cwe/cwe-328

csharp/src/security/CWE-328/WeakPasswordHashing.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
* @problem.severity warning
66
* @security-severity 7.5
77
* @precision high
8-
* @id csharp/weak-password-hashing
8+
* @id githubsecuritylab/weak-password-hashing
99
* @tags security
1010
* external/cwe/cwe-327
1111
* external/cwe/cwe-328

csharp/src/security/CWE-328/WeakSensitiveDataHashing.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
* @problem.severity warning
66
* @security-severity 7.5
77
* @precision high
8-
* @id csharp/weak-sensitive-data-hashing
8+
* @id githubsecuritylab/weak-sensitive-data-hashing
99
* @tags security
1010
* external/cwe/cwe-327
1111
* external/cwe/cwe-328

csharp/src/security/CWE-760/HardcodedSalt.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
* @problem.severity error
66
* @security-severity 6.1
77
* @precision medium
8-
* @id cs/hardcoded-salt
8+
* @id githubsecuritylab/hardcoded-salt
99
* @tags security
1010
* external/cwe/cwe-760
1111
*/

csharp/src/security/CWE-798/HardcodedCredentialsSymmetricSecurityKey.ql

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,17 @@
55
* @problem.severity error
66
* @security-severity 9.8
77
* @precision high
8-
* @id cs/hardcoded-credentials-symmetricsecuritykey
8+
* @id githubsecuritylab/hardcoded-credentials-symmetricsecuritykey
99
* @tags security
1010
* external/cwe/cwe-259
1111
* external/cwe/cwe-321
1212
* external/cwe/cwe-798
1313
*/
1414

1515
import csharp
16-
1716
private import DataFlow::PathGraph
18-
1917
private import github.HardcodedCredentials
2018

21-
2219
from DataFlow::PathNode source, DataFlow::PathNode sink, LiteralToSecurityKeyConfig config
2320
where config.hasFlowPath(source, sink)
2421
select source, sink, source, "Hard-coded credential $@ used as SymmetricSecurityKey $@",

0 commit comments

Comments
 (0)