Skip to content

Commit f8e26f1

Browse files
committed
Refactor MissingJWTSignatureCheck
1 parent cae5637 commit f8e26f1

File tree

3 files changed

+23
-5
lines changed

3 files changed

+23
-5
lines changed

java/ql/lib/semmle/code/java/security/MissingJWTSignatureCheckQuery.qll

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,12 @@ import semmle.code.java.dataflow.DataFlow
55
import semmle.code.java.security.JWT
66

77
/**
8+
* DEPRECATED: Use `MissingJwtSignatureCheckFlow` instead.
9+
*
810
* Models flow from signing keys assignments to qualifiers of JWT insecure parsers.
911
* This is used to determine whether a `JwtParser` performing unsafe parsing has a signing key set.
1012
*/
11-
class MissingJwtSignatureCheckConf extends DataFlow::Configuration {
13+
deprecated class MissingJwtSignatureCheckConf extends DataFlow::Configuration {
1214
MissingJwtSignatureCheckConf() { this = "SigningToExprDataFlow" }
1315

1416
override predicate isSource(DataFlow::Node source) {
@@ -21,3 +23,19 @@ class MissingJwtSignatureCheckConf extends DataFlow::Configuration {
2123
any(JwtParserWithInsecureParseAdditionalFlowStep c).step(node1, node2)
2224
}
2325
}
26+
27+
/**
28+
* Models flow from signing keys assignments to qualifiers of JWT insecure parsers.
29+
* This is used to determine whether a `JwtParser` performing unsafe parsing has a signing key set.
30+
*/
31+
private module MissingJwtSignatureCheckConfig implements DataFlow::ConfigSig {
32+
predicate isSource(DataFlow::Node source) { source instanceof JwtParserWithInsecureParseSource }
33+
34+
predicate isSink(DataFlow::Node sink) { sink instanceof JwtParserWithInsecureParseSink }
35+
36+
predicate isAdditionalFlowStep(DataFlow::Node node1, DataFlow::Node node2) {
37+
any(JwtParserWithInsecureParseAdditionalFlowStep c).step(node1, node2)
38+
}
39+
}
40+
41+
module MissingJwtSignatureCheckFlow = DataFlow::Global<MissingJwtSignatureCheckConfig>;

java/ql/src/Security/CWE/CWE-347/MissingJWTSignatureCheck.ql

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@
1212

1313
import java
1414
import semmle.code.java.security.MissingJWTSignatureCheckQuery
15-
import DataFlow::PathGraph
15+
import MissingJwtSignatureCheckFlow::PathGraph
1616

17-
from DataFlow::PathNode source, DataFlow::PathNode sink, MissingJwtSignatureCheckConf conf
18-
where conf.hasFlowPath(source, sink)
17+
from MissingJwtSignatureCheckFlow::PathNode source, MissingJwtSignatureCheckFlow::PathNode sink
18+
where MissingJwtSignatureCheckFlow::flowPath(source, sink)
1919
select sink.getNode(), source, sink, "This parses a $@, but the signature is not verified.",
2020
source.getNode(), "JWT signing key"

java/ql/test/query-tests/security/CWE-347/MissingJWTSignatureCheckTest.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ class HasMissingJwtSignatureCheckTest extends InlineExpectationsTest {
99

1010
override predicate hasActualResult(Location location, string element, string tag, string value) {
1111
tag = "hasMissingJwtSignatureCheck" and
12-
exists(DataFlow::Node sink, MissingJwtSignatureCheckConf conf | conf.hasFlowTo(sink) |
12+
exists(DataFlow::Node sink | MissingJwtSignatureCheckFlow::flowTo(sink) |
1313
sink.getLocation() = location and
1414
element = sink.toString() and
1515
value = ""

0 commit comments

Comments
 (0)