Skip to content

Commit 8a5fc97

Browse files
committed
Python: Remove deprecated configuration classes referencing deleted api.
1 parent f38602e commit 8a5fc97

25 files changed

+0
-561
lines changed

python/ql/lib/semmle/python/security/dataflow/CleartextLoggingQuery.qll

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,25 +15,6 @@ private import semmle.python.dataflow.new.BarrierGuards
1515
private import semmle.python.dataflow.new.SensitiveDataSources
1616
import CleartextLoggingCustomizations::CleartextLogging
1717

18-
/**
19-
* DEPRECATED: Use `CleartextLoggingFlow` module instead.
20-
*
21-
* A taint-tracking configuration for detecting "Clear-text logging of sensitive information".
22-
*/
23-
deprecated class Configuration extends TaintTracking::Configuration {
24-
Configuration() { this = "CleartextLogging" }
25-
26-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
27-
28-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
29-
30-
override predicate isSanitizer(DataFlow::Node node) {
31-
super.isSanitizer(node)
32-
or
33-
node instanceof Sanitizer
34-
}
35-
}
36-
3718
private module CleartextLoggingConfig implements DataFlow::ConfigSig {
3819
predicate isSource(DataFlow::Node source) { source instanceof Source }
3920

python/ql/lib/semmle/python/security/dataflow/CleartextStorageQuery.qll

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,25 +15,6 @@ private import semmle.python.dataflow.new.BarrierGuards
1515
private import semmle.python.dataflow.new.SensitiveDataSources
1616
import CleartextStorageCustomizations::CleartextStorage
1717

18-
/**
19-
* DEPRECATED: Use `CleartextStorageFlow` module instead.
20-
*
21-
* A taint-tracking configuration for detecting "Clear-text storage of sensitive information".
22-
*/
23-
deprecated class Configuration extends TaintTracking::Configuration {
24-
Configuration() { this = "CleartextStorage" }
25-
26-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
27-
28-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
29-
30-
override predicate isSanitizer(DataFlow::Node node) {
31-
super.isSanitizer(node)
32-
or
33-
node instanceof Sanitizer
34-
}
35-
}
36-
3718
private module CleartextStorageConfig implements DataFlow::ConfigSig {
3819
predicate isSource(DataFlow::Node source) { source instanceof Source }
3920

python/ql/lib/semmle/python/security/dataflow/CodeInjectionQuery.qll

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,21 +11,6 @@ import semmle.python.dataflow.new.DataFlow
1111
import semmle.python.dataflow.new.TaintTracking
1212
import CodeInjectionCustomizations::CodeInjection
1313

14-
/**
15-
* DEPRECATED: Use `CodeInjectionFlow` module instead.
16-
*
17-
* A taint-tracking configuration for detecting "code injection" vulnerabilities.
18-
*/
19-
deprecated class Configuration extends TaintTracking::Configuration {
20-
Configuration() { this = "CodeInjection" }
21-
22-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
23-
24-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
25-
26-
override predicate isSanitizer(DataFlow::Node node) { node instanceof Sanitizer }
27-
}
28-
2914
private module CodeInjectionConfig implements DataFlow::ConfigSig {
3015
predicate isSource(DataFlow::Node source) { source instanceof Source }
3116

python/ql/lib/semmle/python/security/dataflow/CommandInjectionQuery.qll

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,21 +11,6 @@ import semmle.python.dataflow.new.DataFlow
1111
import semmle.python.dataflow.new.TaintTracking
1212
import CommandInjectionCustomizations::CommandInjection
1313

14-
/**
15-
* DEPRECATED: Use `CommandInjectionFlow` module instead.
16-
*
17-
* A taint-tracking configuration for detecting "command injection" vulnerabilities.
18-
*/
19-
deprecated class Configuration extends TaintTracking::Configuration {
20-
Configuration() { this = "CommandInjection" }
21-
22-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
23-
24-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
25-
26-
override predicate isSanitizer(DataFlow::Node node) { node instanceof Sanitizer }
27-
}
28-
2914
/**
3015
* A taint-tracking configuration for detecting "command injection" vulnerabilities.
3116
*/

python/ql/lib/semmle/python/security/dataflow/LdapInjectionQuery.qll

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -13,22 +13,6 @@ import semmle.python.dataflow.new.TaintTracking
1313
import semmle.python.dataflow.new.RemoteFlowSources
1414
import LdapInjectionCustomizations::LdapInjection
1515

16-
/**
17-
* DEPRECATED: Use `LdapInjectionDnFlow` module instead.
18-
*
19-
* A taint-tracking configuration for detecting LDAP injection vulnerabilities
20-
* via the distinguished name (DN) parameter of an LDAP search.
21-
*/
22-
deprecated class DnConfiguration extends TaintTracking::Configuration {
23-
DnConfiguration() { this = "LdapDnInjection" }
24-
25-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
26-
27-
override predicate isSink(DataFlow::Node sink) { sink instanceof DnSink }
28-
29-
override predicate isSanitizer(DataFlow::Node node) { node instanceof DnSanitizer }
30-
}
31-
3216
private module LdapInjectionDnConfig implements DataFlow::ConfigSig {
3317
predicate isSource(DataFlow::Node source) { source instanceof Source }
3418

@@ -40,22 +24,6 @@ private module LdapInjectionDnConfig implements DataFlow::ConfigSig {
4024
/** Global taint-tracking for detecting "LDAP injection via the distinguished name (DN) parameter" vulnerabilities. */
4125
module LdapInjectionDnFlow = TaintTracking::Global<LdapInjectionDnConfig>;
4226

43-
/**
44-
* DEPRECATED: Use `LdapInjectionFilterFlow` module instead.
45-
*
46-
* A taint-tracking configuration for detecting LDAP injection vulnerabilities
47-
* via the filter parameter of an LDAP search.
48-
*/
49-
deprecated class FilterConfiguration extends TaintTracking::Configuration {
50-
FilterConfiguration() { this = "LdapFilterInjection" }
51-
52-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
53-
54-
override predicate isSink(DataFlow::Node sink) { sink instanceof FilterSink }
55-
56-
override predicate isSanitizer(DataFlow::Node node) { node instanceof FilterSanitizer }
57-
}
58-
5927
private module LdapInjectionFilterConfig implements DataFlow::ConfigSig {
6028
predicate isSource(DataFlow::Node source) { source instanceof Source }
6129

python/ql/lib/semmle/python/security/dataflow/LogInjectionQuery.qll

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,21 +11,6 @@ import semmle.python.dataflow.new.DataFlow
1111
import semmle.python.dataflow.new.TaintTracking
1212
import LogInjectionCustomizations::LogInjection
1313

14-
/**
15-
* DEPRECATED: Use `LogInjectionFlow` module instead.
16-
*
17-
* A taint-tracking configuration for tracking untrusted user input used in log entries.
18-
*/
19-
deprecated class Configuration extends TaintTracking::Configuration {
20-
Configuration() { this = "LogInjection" }
21-
22-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
23-
24-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
25-
26-
override predicate isSanitizer(DataFlow::Node node) { node instanceof Sanitizer }
27-
}
28-
2914
private module LogInjectionConfig implements DataFlow::ConfigSig {
3015
predicate isSource(DataFlow::Node source) { source instanceof Source }
3116

python/ql/lib/semmle/python/security/dataflow/PamAuthorizationQuery.qll

Lines changed: 0 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -11,35 +11,6 @@ import semmle.python.ApiGraphs
1111
import semmle.python.dataflow.new.TaintTracking
1212
import PamAuthorizationCustomizations::PamAuthorizationCustomizations
1313

14-
/**
15-
* DEPRECATED: Use `PamAuthorizationFlow` module instead.
16-
*
17-
* A taint-tracking configuration for detecting "PAM Authorization" vulnerabilities.
18-
*/
19-
deprecated class Configuration extends TaintTracking::Configuration {
20-
Configuration() { this = "PamAuthorization" }
21-
22-
override predicate isSource(DataFlow::Node node) { node instanceof Source }
23-
24-
override predicate isSink(DataFlow::Node node) { node instanceof Sink }
25-
26-
override predicate isAdditionalTaintStep(DataFlow::Node node1, DataFlow::Node node2) {
27-
// Models flow from a remotely supplied username field to a PAM `handle`.
28-
// `retval = pam_start(service, username, byref(conv), byref(handle))`
29-
exists(API::CallNode pamStart, DataFlow::Node handle, API::CallNode pointer |
30-
pointer = API::moduleImport("ctypes").getMember(["pointer", "byref"]).getACall() and
31-
pamStart = libPam().getMember("pam_start").getACall() and
32-
pointer = pamStart.getArg(3) and
33-
handle = pointer.getArg(0) and
34-
pamStart.getArg(1) = node1 and
35-
handle = node2
36-
)
37-
or
38-
// Flow from handle to the authenticate call in the final step
39-
exists(VulnPamAuthCall c | c.getArg(0) = node1 | node2 = c)
40-
}
41-
}
42-
4314
private module PamAuthorizationConfig implements DataFlow::ConfigSig {
4415
predicate isSource(DataFlow::Node source) { source instanceof Source }
4516

python/ql/lib/semmle/python/security/dataflow/PathInjectionQuery.qll

Lines changed: 0 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -12,57 +12,6 @@ import semmle.python.dataflow.new.DataFlow
1212
import semmle.python.dataflow.new.TaintTracking
1313
import PathInjectionCustomizations::PathInjection
1414

15-
/**
16-
* DEPRECATED: Use `PathInjectionFlow` module instead.
17-
*
18-
* A taint-tracking configuration for detecting "path injection" vulnerabilities.
19-
*
20-
* This configuration uses two flow states, `NotNormalized` and `NormalizedUnchecked`,
21-
* to track the requirement that a file path must be first normalized and then checked
22-
* before it is safe to use.
23-
*
24-
* At sources, paths are assumed not normalized. At normalization points, they change
25-
* state to `NormalizedUnchecked` after which they can be made safe by an appropriate
26-
* check of the prefix.
27-
*
28-
* Such checks are ineffective in the `NotNormalized` state.
29-
*/
30-
deprecated class Configuration extends TaintTracking::Configuration {
31-
Configuration() { this = "PathInjection" }
32-
33-
override predicate isSource(DataFlow::Node source, DataFlow::FlowState state) {
34-
source instanceof Source and state instanceof NotNormalized
35-
}
36-
37-
override predicate isSink(DataFlow::Node sink, DataFlow::FlowState state) {
38-
sink instanceof Sink and
39-
(
40-
state instanceof NotNormalized or
41-
state instanceof NormalizedUnchecked
42-
)
43-
}
44-
45-
override predicate isSanitizer(DataFlow::Node node) { node instanceof Sanitizer }
46-
47-
override predicate isSanitizer(DataFlow::Node node, DataFlow::FlowState state) {
48-
// Block `NotNormalized` paths here, since they change state to `NormalizedUnchecked`
49-
node instanceof Path::PathNormalization and
50-
state instanceof NotNormalized
51-
or
52-
node instanceof Path::SafeAccessCheck and
53-
state instanceof NormalizedUnchecked
54-
}
55-
56-
override predicate isAdditionalTaintStep(
57-
DataFlow::Node nodeFrom, DataFlow::FlowState stateFrom, DataFlow::Node nodeTo,
58-
DataFlow::FlowState stateTo
59-
) {
60-
nodeFrom = nodeTo.(Path::PathNormalization).getPathArg() and
61-
stateFrom instanceof NotNormalized and
62-
stateTo instanceof NormalizedUnchecked
63-
}
64-
}
65-
6615
abstract private class NormalizationState extends string {
6716
bindingset[this]
6817
NormalizationState() { any() }

python/ql/lib/semmle/python/security/dataflow/PolynomialReDoSQuery.qll

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,21 +11,6 @@ import semmle.python.dataflow.new.DataFlow
1111
import semmle.python.dataflow.new.TaintTracking
1212
import PolynomialReDoSCustomizations::PolynomialReDoS
1313

14-
/**
15-
* DEPRECATED: Use `PolynomialReDoSFlow` module instead.
16-
*
17-
* A taint-tracking configuration for detecting "polynomial regular expression denial of service (ReDoS)" vulnerabilities.
18-
*/
19-
deprecated class Configuration extends TaintTracking::Configuration {
20-
Configuration() { this = "PolynomialReDoS" }
21-
22-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
23-
24-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
25-
26-
override predicate isSanitizer(DataFlow::Node node) { node instanceof Sanitizer }
27-
}
28-
2914
private module PolynomialReDoSConfig implements DataFlow::ConfigSig {
3015
predicate isSource(DataFlow::Node source) { source instanceof Source }
3116

python/ql/lib/semmle/python/security/dataflow/ReflectedXssQuery.qll

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,21 +11,6 @@ import semmle.python.dataflow.new.DataFlow
1111
import semmle.python.dataflow.new.TaintTracking
1212
import ReflectedXSSCustomizations::ReflectedXss
1313

14-
/**
15-
* DEPRECATED: Use `ReflectedXssFlow` module instead.
16-
*
17-
* A taint-tracking configuration for detecting "reflected server-side cross-site scripting" vulnerabilities.
18-
*/
19-
deprecated class Configuration extends TaintTracking::Configuration {
20-
Configuration() { this = "ReflectedXSS" }
21-
22-
override predicate isSource(DataFlow::Node source) { source instanceof Source }
23-
24-
override predicate isSink(DataFlow::Node sink) { sink instanceof Sink }
25-
26-
override predicate isSanitizer(DataFlow::Node node) { node instanceof Sanitizer }
27-
}
28-
2914
private module ReflectedXssConfig implements DataFlow::ConfigSig {
3015
predicate isSource(DataFlow::Node source) { source instanceof Source }
3116

0 commit comments

Comments
 (0)