|
| 1 | +/** |
| 2 | + * Provides classes and predicates for reasoning about cleartext database |
| 3 | + * storage vulnerabilities. |
| 4 | + */ |
| 5 | + |
| 6 | +import swift |
| 7 | +import codeql.swift.security.SensitiveExprs |
| 8 | +import codeql.swift.dataflow.DataFlow |
| 9 | +import codeql.swift.dataflow.ExternalFlow |
| 10 | + |
| 11 | +/** |
| 12 | + * A dataflow sink for cleartext database storage vulnerabilities. That is, |
| 13 | + * a `DataFlow::Node` that is something stored in a local database. |
| 14 | + */ |
| 15 | +abstract class CleartextStorageDatabaseSink extends DataFlow::Node { } |
| 16 | + |
| 17 | +/** |
| 18 | + * A sanitizer for cleartext database storage vulnerabilities. |
| 19 | + */ |
| 20 | +abstract class CleartextStorageDatabaseSanitizer extends DataFlow::Node { } |
| 21 | + |
| 22 | +/** |
| 23 | + * A unit class for adding additional taint steps. |
| 24 | + */ |
| 25 | +class CleartextStorageDatabaseAdditionalTaintStep extends Unit { |
| 26 | + /** |
| 27 | + * Holds if the step from `node1` to `node2` should be considered a taint |
| 28 | + * step for paths related to cleartext database storage vulnerabilities. |
| 29 | + */ |
| 30 | + abstract predicate step(DataFlow::Node nodeFrom, DataFlow::Node nodeTo); |
| 31 | +} |
| 32 | + |
| 33 | +/** |
| 34 | + * A `DataFlow::Node` that is an expression stored with the Core Data library. |
| 35 | + */ |
| 36 | +private class CoreDataStore extends CleartextStorageDatabaseSink { |
| 37 | + CoreDataStore() { |
| 38 | + // values written into Core Data objects through `set*Value` methods are a sink. |
| 39 | + exists(CallExpr call | |
| 40 | + call.getStaticTarget() |
| 41 | + .(MethodDecl) |
| 42 | + .hasQualifiedName("NSManagedObject", |
| 43 | + ["setValue(_:forKey:)", "setPrimitiveValue(_:forKey:)"]) and |
| 44 | + call.getArgument(0).getExpr() = this.asExpr() |
| 45 | + ) |
| 46 | + or |
| 47 | + // any write into a class derived from `NSManagedObject` is a sink. For |
| 48 | + // example in `coreDataObj.data = sensitive` the post-update node corresponding |
| 49 | + // with `coreDataObj.data` is a sink. |
| 50 | + // (ideally this would be only members with the `@NSManaged` attribute) |
| 51 | + exists(ClassOrStructDecl cd, Expr e | |
| 52 | + cd.getABaseTypeDecl*().getName() = "NSManagedObject" and |
| 53 | + this.(DataFlow::PostUpdateNode).getPreUpdateNode().asExpr() = e and |
| 54 | + e.getFullyConverted().getType() = cd.getType() and |
| 55 | + not e.(DeclRefExpr).getDecl() instanceof SelfParamDecl |
| 56 | + ) |
| 57 | + } |
| 58 | +} |
| 59 | + |
| 60 | +/** |
| 61 | + * A `DataFlow::Node` that is an expression stored with the Realm database |
| 62 | + * library. |
| 63 | + */ |
| 64 | +private class RealmStore extends CleartextStorageDatabaseSink instanceof DataFlow::PostUpdateNode { |
| 65 | + RealmStore() { |
| 66 | + // any write into a class derived from `RealmSwiftObject` is a sink. For |
| 67 | + // example in `realmObj.data = sensitive` the post-update node corresponding |
| 68 | + // with `realmObj.data` is a sink. |
| 69 | + exists(ClassOrStructDecl cd, Expr e | |
| 70 | + cd.getABaseTypeDecl*().getName() = "RealmSwiftObject" and |
| 71 | + this.getPreUpdateNode().asExpr() = e and |
| 72 | + e.getFullyConverted().getType() = cd.getType() and |
| 73 | + not e.(DeclRefExpr).getDecl() instanceof SelfParamDecl |
| 74 | + ) |
| 75 | + } |
| 76 | +} |
| 77 | + |
| 78 | +private class CleartextStorageDatabaseSinks extends SinkModelCsv { |
| 79 | + override predicate row(string row) { |
| 80 | + row = |
| 81 | + [ |
| 82 | + // GRDB sinks |
| 83 | + ";Database;true;allStatements(sql:arguments:);;;Argument[1];database-store", |
| 84 | + ";Database;true;execute(sql:arguments:);;;Argument[1];database-store", |
| 85 | + ";SQLRequest;true;init(sql:arguments:adapter:cached:);;;Argument[1];database-store", |
| 86 | + ";SQL;true;init(sql:arguments:);;;Argument[1];database-store", |
| 87 | + ";SQL;true;append(sql:arguments:);;;Argument[1];database-store", |
| 88 | + ";SQLStatementCursor;true;init(database:sql:arguments:prepFlags:);;;Argument[2];database-store", |
| 89 | + ";TableRecord;true;select(sql:arguments:);;;Argument[1];database-store", |
| 90 | + ";TableRecord;true;select(sql:arguments:as:);;;Argument[1];database-store", |
| 91 | + ";TableRecord;true;filter(sql:arguments:);;;Argument[1];database-store", |
| 92 | + ";TableRecord;true;order(sql:arguments:);;;Argument[1];database-store", |
| 93 | + ";Row;true;fetchCursor(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 94 | + ";Row;true;fetchAll(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 95 | + ";Row;true;fetchSet(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 96 | + ";Row;true;fetchOne(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 97 | + ";DatabaseValueConvertible;true;fetchCursor(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 98 | + ";DatabaseValueConvertible;true;fetchAll(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 99 | + ";DatabaseValueConvertible;true;fetchSet(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 100 | + ";DatabaseValueConvertible;true;fetchOne(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 101 | + ";FetchableRecord;true;fetchCursor(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 102 | + ";FetchableRecord;true;fetchAll(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 103 | + ";FetchableRecord;true;fetchSet(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 104 | + ";FetchableRecord;true;fetchOne(_:sql:arguments:adapter:);;;Argument[2];database-store", |
| 105 | + ";FetchableRecord;true;fetchCursor(_:arguments:adapter:);;;Argument[1];database-store", |
| 106 | + ";FetchableRecord;true;fetchAll(_:arguments:adapter:);;;Argument[1];database-store", |
| 107 | + ";FetchableRecord;true;fetchSet(_:arguments:adapter:);;;Argument[1];database-store", |
| 108 | + ";FetchableRecord;true;fetchOne(_:arguments:adapter:);;;Argument[1];database-store", |
| 109 | + ";Statement;true;execute(arguments:);;;Argument[0];database-store", |
| 110 | + ";CommonTableExpression;true;init(recursive:named:columns:sql:arguments:);;;Argument[4];database-store", |
| 111 | + ";Statement;true;setArguments(_:);;;Argument[0];database-store" |
| 112 | + ] |
| 113 | + } |
| 114 | +} |
| 115 | + |
| 116 | +/** |
| 117 | + * An encryption sanitizer for cleartext database storage vulnerabilities. |
| 118 | + */ |
| 119 | +private class CleartextStorageDatabaseEncryptionSanitizer extends CleartextStorageDatabaseSanitizer { |
| 120 | + CleartextStorageDatabaseEncryptionSanitizer() { this.asExpr() instanceof EncryptedExpr } |
| 121 | +} |
| 122 | + |
| 123 | +/** |
| 124 | + * An additional taint step for cleartext database storage vulnerabilities. |
| 125 | + * Needed until we have proper content flow through arrays. |
| 126 | + */ |
| 127 | +private class CleartextStorageDatabaseArrayAdditionalTaintStep extends CleartextStorageDatabaseAdditionalTaintStep { |
| 128 | + override predicate step(DataFlow::Node nodeFrom, DataFlow::Node nodeTo) { |
| 129 | + exists(ArrayExpr arr | |
| 130 | + nodeFrom.asExpr() = arr.getAnElement() and |
| 131 | + nodeTo.asExpr() = arr |
| 132 | + ) |
| 133 | + } |
| 134 | +} |
| 135 | + |
| 136 | +/** |
| 137 | + * A sink defined in a CSV model. |
| 138 | + */ |
| 139 | +private class DefaultCleartextStorageDatabaseSink extends CleartextStorageDatabaseSink { |
| 140 | + DefaultCleartextStorageDatabaseSink() { sinkNode(this, "database-store") } |
| 141 | +} |
0 commit comments