Skip to content

Commit 6d496ee

Browse files
authored
Merge pull request #257 from microsoft/jb1/reapply-22.1-tmp
Revert #251, Reapply `codeql-cli/v2.22.1`
2 parents 866977b + b1b0892 commit 6d496ee

File tree

3,052 files changed

+68552
-155274
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,052 files changed

+68552
-155274
lines changed

.github/copilot-instructions.md

Lines changed: 0 additions & 4 deletions
This file was deleted.

.github/workflows/check-change-note.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ on:
1616
- "shared/**/*.qll"
1717
- "!**/experimental/**"
1818
- "!ql/**"
19+
- "!rust/**"
1920
- ".github/workflows/check-change-note.yml"
2021

2122
jobs:

.github/workflows/check-overlay-annotations.yml

Lines changed: 0 additions & 23 deletions
This file was deleted.

.github/workflows/ql-for-ql-dataset_measure.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ jobs:
5353
- name: Create database
5454
run: |
5555
"${CODEQL}" database create \
56-
--search-path "${{ github.workspace }}" \
56+
--search-path "${{ github.workspace }}"
5757
--threads 4 \
5858
--language ql --source-root "${{ github.workspace }}/repo" \
5959
"${{ runner.temp }}/database"

Cargo.lock

Lines changed: 0 additions & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

actions/ql/lib/qlpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
name: codeql/actions-all
2-
version: 0.4.13-dev
2+
version: 0.4.12
33
library: true
44
warnOnImplicitThis: true
55
dependencies:

actions/ql/src/Security/CWE-077/EnvPathInjectionCritical.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
## Overview
1+
# Environment Path Injection
2+
3+
## Description
24

35
GitHub Actions allow to define the system PATH variable by writing to a file pointed to by the `GITHUB_PATH` environment variable. Writing to this file appends a directory to the system PATH variable and automatically makes it available to all subsequent actions in the current job.
46

@@ -10,11 +12,11 @@ echo "$HOME/.local/bin" >> $GITHUB_PATH
1012

1113
If an attacker can control the contents of the system PATH, they are able to influence what commands are run in subsequent steps of the same job.
1214

13-
## Recommendation
15+
## Recommendations
1416

1517
Do not allow untrusted data to influence the system PATH: Avoid using untrusted data sources (e.g., artifact content) to define the system PATH.
1618

17-
## Example
19+
## Examples
1820

1921
### Incorrect Usage
2022

@@ -34,4 +36,4 @@ If an attacker can manipulate the value being set, such as through artifact down
3436
3537
## References
3638
37-
- GitHub Docs: [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions).
39+
- [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions)

actions/ql/src/Security/CWE-077/EnvPathInjectionMedium.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
## Overview
1+
# Environment Path Injection
2+
3+
## Description
24

35
GitHub Actions allow to define the system PATH variable by writing to a file pointed to by the `GITHUB_PATH` environment variable. Writing to this file appends a directory to the system PATH variable and automatically makes it available to all subsequent actions in the current job.
46

@@ -10,11 +12,11 @@ echo "$HOME/.local/bin" >> $GITHUB_PATH
1012

1113
If an attacker can control the contents of the system PATH, they are able to influence what commands are run in subsequent steps of the same job.
1214

13-
## Recommendation
15+
## Recommendations
1416

1517
Do not allow untrusted data to influence the system PATH: Avoid using untrusted data sources (e.g., artifact content) to define the system PATH.
1618

17-
## Example
19+
## Examples
1820

1921
### Incorrect Usage
2022

@@ -34,4 +36,4 @@ If an attacker can manipulate the value being set, such as through artifact down
3436
3537
## References
3638
37-
- GitHub Docs: [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions).
39+
- [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions)

actions/ql/src/Security/CWE-077/EnvVarInjectionCritical.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
## Overview
1+
# Environment Variable Injection
2+
3+
## Description
24

35
GitHub Actions allow to define environment variables by writing to a file pointed to by the `GITHUB_ENV` environment variable:
46

@@ -35,7 +37,7 @@ steps:
3537

3638
If an attacker can control the values assigned to environment variables and there is no sanitization in place, the attacker will be able to inject additional variables by injecting new lines or `{delimiters}`.
3739

38-
## Recommendation
40+
## Recommendations
3941

4042
1. **Do not allow untrusted data to influence environment variables**:
4143

@@ -62,7 +64,7 @@ If an attacker can control the values assigned to environment variables and ther
6264
} >> "$GITHUB_ENV"
6365
```
6466

65-
## Example
67+
## Examples
6668

6769
### Example of Vulnerability
6870

@@ -111,5 +113,5 @@ An attacker is be able to run arbitrary code by injecting environment variables
111113
112114
## References
113115
114-
- GitHub Docs: [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions).
115-
- Synacktiv: [GitHub Actions Exploitation: Repo Jacking and Environment Manipulation](https://www.synacktiv.com/publications/github-actions-exploitation-repo-jacking-and-environment-manipulation).
116+
- [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions)
117+
- [GitHub Actions Exploitation: Repo Jacking and Environment Manipulation](https://www.synacktiv.com/publications/github-actions-exploitation-repo-jacking-and-environment-manipulation)

actions/ql/src/Security/CWE-077/EnvVarInjectionMedium.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
## Overview
1+
# Environment Variable Injection
2+
3+
## Description
24

35
GitHub Actions allow to define environment variables by writing to a file pointed to by the `GITHUB_ENV` environment variable:
46

@@ -35,7 +37,7 @@ steps:
3537

3638
If an attacker can control the values assigned to environment variables and there is no sanitization in place, the attacker will be able to inject additional variables by injecting new lines or `{delimiters}`.
3739

38-
## Recommendation
40+
## Recommendations
3941

4042
1. **Do not allow untrusted data to influence environment variables**:
4143

@@ -62,7 +64,7 @@ If an attacker can control the values assigned to environment variables and ther
6264
} >> "$GITHUB_ENV"
6365
```
6466

65-
## Example
67+
## Examples
6668

6769
### Example of Vulnerability
6870

@@ -111,5 +113,5 @@ An attacker would be able to run arbitrary code by injecting environment variabl
111113
112114
## References
113115
114-
- GitHub Docs: [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions).
115-
- Synacktiv: [GitHub Actions Exploitation: Repo Jacking and Environment Manipulation](https://www.synacktiv.com/publications/github-actions-exploitation-repo-jacking-and-environment-manipulation).
116+
- [Workflow commands for GitHub Actions](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions)
117+
- [GitHub Actions Exploitation: Repo Jacking and Environment Manipulation](https://www.synacktiv.com/publications/github-actions-exploitation-repo-jacking-and-environment-manipulation)

0 commit comments

Comments
 (0)