Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -411,6 +411,48 @@ Exercise 4
GetenvToGethostbynameFlow::flow(source, sink)
select getenv, fc

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd recommend adding a link to this example to line 318, after the description of Exercise 4, to make it easier for users to find this example.

I'd suggest a similar change to all articles that have exercise numbering like this - I think that's everything down to and including JavaScript/TypeScript.

Path Query Example
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We use sentence case:

Suggested change
Path Query Example
Path query example

Please update in all files

~~~~~~~~~~~~~~~~~~

Here is the answer to exercise 4 above, converted into a path query:

.. code-block:: ql

/**
* @kind path-problem
* @problem.severity warning
* @id getenv-to-gethostbyname
*/

import cpp
import semmle.code.cpp.dataflow.new.DataFlow

class GetenvSource extends DataFlow::Node {
GetenvSource() { this.asIndirectExpr(1).(FunctionCall).getTarget().hasGlobalName("getenv") }
}

module GetenvToGethostbynameConfiguration implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof GetenvSource }

predicate isSink(DataFlow::Node sink) {
exists(FunctionCall fc |
sink.asIndirectExpr(1) = fc.getArgument(0) and
fc.getTarget().hasName("gethostbyname")
)
}
}

module GetenvToGethostbynameFlow = DataFlow::Global<GetenvToGethostbynameConfiguration>;

import GetenvToGethostbynameFlow::PathGraph

from GetenvToGethostbynameFlow::PathNode source, GetenvToGethostbynameFlow::PathNode sink
where GetenvToGethostbynameFlow::flowPath(source, sink)
select sink.getNode(), source, sink, "This file access uses data from $@.",
source, "user-controllable input."

For more information, see "`Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__".

Further reading
---------------

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -537,6 +537,48 @@ This can be adapted from the ``SystemUriFlow`` class:
}
}

Path Query Example
~~~~~~~~~~~~~~~~~~

Here is the answer to exercise 4 above, converted into a path query:

.. code-block:: ql

/**
* @kind path-problem
* @problem.severity warning
* @id getenv-to-gethostbyname
*/

import csharp

class EnvironmentVariableFlowSource extends DataFlow::ExprNode {
EnvironmentVariableFlowSource() {
this.getExpr().(MethodCall).getTarget().hasQualifiedName("System.Environment.GetEnvironmentVariable")
}
}

module EnvironmentToUriConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node src) {
src instanceof EnvironmentVariableFlowSource
}

predicate isSink(DataFlow::Node sink) {
exists(Call c | c.getTarget().(Constructor).getDeclaringType().hasQualifiedName("System.Uri")
and sink.asExpr()=c.getArgument(0))
}
}

module EnvironmentToUriFlow = DataFlow::Global<EnvironmentToUriConfig>;

import EnvironmentToUriFlow::PathGraph

from EnvironmentToUriFlow::PathNode src, EnvironmentToUriFlow::PathNode sink
where EnvironmentToUriFlow::flowPath(src, sink)
select src.getNode(), src, sink, "This environment variable constructs a 'System.Uri' $@.", sink, "here"

For more information, see "`Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__".

Further reading
---------------

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -224,7 +224,7 @@ The resulting module has an identical signature to the one obtained from ``DataF
Flow sources
~~~~~~~~~~~~

The data flow library contains some predefined flow sources. The class ``RemoteFlowSource`` (defined in ``semmle.code.java.dataflow.FlowSources``) represents data flow sources that may be controlled by a remote user, which is useful for finding security problems.
The data flow library contains some predefined flow sources. The class ``RemoteFlowSource`` represents data flow sources that may be controlled by a remote user, which is useful for finding security problems.

Examples
~~~~~~~~
Expand Down Expand Up @@ -312,7 +312,7 @@ Exercise 3

import go

class GetenvSource extends CallExpr {
class GetenvSource extends DataFlow::CallNode {
GetenvSource() {
exists(Function m | m = this.getTarget() |
m.hasQualifiedName("os", "Getenv")
Expand All @@ -327,7 +327,7 @@ Exercise 4

import go

class GetenvSource extends CallExpr {
class GetenvSource extends DataFlow::CallNode {
GetenvSource() {
exists(Function m | m = this.getTarget() |
m.hasQualifiedName("os", "Getenv")
Expand All @@ -350,7 +350,6 @@ Exercise 4
sink.asExpr() = call.getArgument(0)
)
}
}
}

module GetenvToURLFlow = DataFlow::Global<GetenvToURLConfig>;
Expand All @@ -359,6 +358,56 @@ Exercise 4
where GetenvToURLFlow::flow(src, sink)
select src, "This environment variable constructs a URL $@.", sink, "here"

Path Query Example
~~~~~~~~~~~~~~~~~~

Here is the answer to exercise 4 above, converted into a path query:

.. code-block:: ql

/**
* @kind path-problem
* @problem.severity warning
* @id getenv-to-url
*/

import go

class GetenvSource extends DataFlow::CallNode {
GetenvSource() {
exists(Function m | m = this.getTarget() |
m.hasQualifiedName("os", "Getenv")
)
}
}

module GetenvToURLConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) {
source instanceof GetenvSource
}

predicate isSink(DataFlow::Node sink) {
exists(Function urlParse, CallExpr call |
(
urlParse.hasQualifiedName("url", "Parse") or
urlParse.hasQualifiedName("url", "ParseRequestURI")
) and
call.getTarget() = urlParse and
sink.asExpr() = call.getArgument(0)
)
}
}

module GetenvToURLFlow = DataFlow::Global<GetenvToURLConfig>;

import GetenvToURLFlow::PathGraph

from GetenvToURLFlow::PathNode src, GetenvToURLFlow::PathNode sink
where GetenvToURLFlow::flowPath(src, sink)
select src.getNode(), src, sink, "This environment variable constructs a URL $@.", sink, "here"

For more information, see "`Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__".

Further reading
---------------

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -361,6 +361,54 @@ Exercise 4
where GetenvToURLFlow::flow(src, sink)
select src, "This environment variable constructs a URL $@.", sink, "here"

Path Query Example
~~~~~~~~~~~~~~~~~~

Here is the answer to exercise 4 above, converted into a path query:

.. code-block:: ql

/**
* @kind path-problem
* @problem.severity warning
* @id getenv-to-url
*/

import java
import semmle.code.java.dataflow.DataFlow

class GetenvSource extends DataFlow::ExprNode {
GetenvSource() {
exists(Method m | m = this.asExpr().(MethodCall).getMethod() |
m.hasName("getenv") and
m.getDeclaringType() instanceof TypeSystem
)
}
}

module GetenvToURLConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) {
source instanceof GetenvSource
}

predicate isSink(DataFlow::Node sink) {
exists(Call call |
sink.asExpr() = call.getArgument(0) and
call.getCallee().(Constructor).getDeclaringType().hasQualifiedName("java.net", "URL")
)
}
}

module GetenvToURLFlow = DataFlow::Global<GetenvToURLConfig>;

import GetenvToURLFlow::PathGraph

from GetenvToURLFlow::PathNode src, GetenvToURLFlow::PathNode sink
where GetenvToURLFlow::flowPath(src, sink)
select src.getNode(), src, sink, "This environment variable constructs a URL $@.", sink, "here"

For more information, see "`Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__".

Further reading
---------------

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -541,6 +541,48 @@ Exercise 4
where HardCodedTagNameFlow::flow(source, sink)
select source, sink

Path Query Example
~~~~~~~~~~~~~~~~~~

Here is the answer to exercise 4 above, converted into a path query:

.. code-block:: ql

/**
* @kind path-problem
* @problem.severity warning
* @id hard-coded-tag-name
*/

import javascript

class ArrayEntryCallResult extends DataFlow::Node {
ArrayEntryCallResult() {
exists(DataFlow::CallNode call, string index |
this = call.getAPropertyRead(index) and
index.regexpMatch("\\d+")
)
}
}

module HardCodedTagNameConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof ArrayEntryCallResult }

predicate isSink(DataFlow::Node sink) {
sink = DataFlow::globalVarRef("document").getAMethodCall("createElement").getArgument(0)
}
}

module HardCodedTagNameFlow = DataFlow::Global<HardCodedTagNameConfig>;

import HardCodedTagNameFlow::PathGraph

from HardCodedTagNameFlow::PathNode source, HardCodedTagNameFlow::PathNode sink
where HardCodedTagNameFlow::flowPath(source, sink)
select sink.getNode(), source, sink, "Hard-coded tag name $@.", source, "here"

For more information, see "`Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__".

Further reading
---------------

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -354,11 +354,50 @@ This data flow configuration tracks data flow from environment variables to open
select fileOpen, "This call to 'os.open' uses data from $@.",
environment, "call to 'os.getenv'"

Path Query Example
~~~~~~~~~~~~~~~~~~

Here is the first example above, converted into a path query:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be good to be more explicit here, maybe:

Suggested change
Here is the first example above, converted into a path query:
Here is the network input example above, converted into a path query:

Alternatively, you could give the two queries above a heading.


.. code-block:: ql

/**
* @kind path-problem
* @problem.severity warning
* @id file-system-access-from-remote-input
*/

import python
import semmle.python.dataflow.new.DataFlow
import semmle.python.dataflow.new.TaintTracking
import semmle.python.dataflow.new.RemoteFlowSources
import semmle.python.Concepts

module RemoteToFileConfiguration implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) {
source instanceof RemoteFlowSource
}

predicate isSink(DataFlow::Node sink) {
sink = any(FileSystemAccess fa).getAPathArgument()
}
}

module RemoteToFileFlow = TaintTracking::Global<RemoteToFileConfiguration>;

import RemoteToFileFlow::PathGraph

from RemoteToFileFlow::PathNode input, RemoteToFileFlow::PathNode fileAccess
where RemoteToFileFlow::flowPath(input, fileAccess)
select fileAccess.getNode(), input, fileAccess, "This file access uses data from $@.",
input, "user-controllable input."

For more information, see "`Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__".

Further reading
---------------

- `Exploring data flow with path queries <https://docs.github.com/en/code-security/codeql-for-vs-code/getting-started-with-codeql-for-vs-code/exploring-data-flow-with-path-queries>`__ in the GitHub documentation.
- `Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__ in the GitHub documentation.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We've changed docs sites from GitHub to CodeQL, so we can simplify this:

Suggested change
- `Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__ in the GitHub documentation.
- `Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__.



.. include:: ../reusables/python-further-reading.rst
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -372,6 +372,43 @@ The following global data-flow query finds calls to ``File.open`` where the file
select fileOpen, "This call to 'File.open' uses data from $@.", environment,
"an environment variable"
Path Query Example
~~~~~~~~~~~~~~~~~~

Here is the first example above, converted into a path query:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The same comment on the Python description applies here and to the Ruby, Rust, and Swift examples.


.. code-block:: ql
/**
* @kind path-problem
* @problem.severity warning
* @id file-system-access-from-remote-input
*/
import codeql.ruby.DataFlow
import codeql.ruby.TaintTracking
import codeql.ruby.Concepts
import codeql.ruby.dataflow.RemoteFlowSources
module RemoteToFileConfiguration implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
predicate isSink(DataFlow::Node sink) {
sink = any(FileSystemAccess fa).getAPathArgument()
}
}
module RemoteToFileFlow = TaintTracking::Global<RemoteToFileConfiguration>;
import RemoteToFileFlow::PathGraph
from RemoteToFileFlow::PathNode input, RemoteToFileFlow::PathNode fileAccess
where RemoteToFileFlow::flowPath(input, fileAccess)
select fileAccess.getNode(), input, fileAccess, "This file access uses data from $@.",
input, "user-controllable input."
For more information, see "`Creating path queries <https://codeql.github.com/docs/writing-codeql-queries/creating-path-queries/>`__".

Further reading
---------------

Expand Down
Loading