Skip to content

Commit 23e23ec

Browse files
committed
C#: Adjust query metadata and library references.
1 parent e3896d6 commit 23e23ec

15 files changed

+18
-33
lines changed

csharp/src/security/CWE-099/TaintedWebClient.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,8 @@
55
* @kind path-problem
66
* @problem.severity error
77
* @precision high
8-
* @id cs/webclient-path-injection
8+
* @id githubsecuritylab/cs/webclient-path-injection
99
* @tags security
10-
* experimental
1110
* external/cwe/cwe-099
1211
* external/cwe/cwe-023
1312
* external/cwe/cwe-036

csharp/src/security/CWE-1004/CookieWithoutHttpOnly.ql

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,16 @@
77
* @kind problem
88
* @problem.severity warning
99
* @precision high
10-
* @id cs/web/cookie-httponly-not-set
10+
* @id githubsecuritylab/cs/web/cookie-httponly-not-set
1111
* @tags security
12-
* experimental
1312
* external/cwe/cwe-1004
1413
*/
1514

1615
import csharp
1716
import semmle.code.asp.WebConfig
1817
import semmle.code.csharp.frameworks.system.Web
1918
import semmle.code.csharp.frameworks.microsoft.AspNetCore
20-
import experimental.dataflow.flowsources.AuthCookie
19+
import security.dataflow.flowsources.AuthCookie
2120

2221
from Expr httpOnlySink
2322
where

csharp/src/security/CWE-327/Azure/UnsafeUsageOfClientSideEncryptionVersion.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,8 @@
44
* @kind problem
55
* @tags security
66
* cryptography
7-
* experimental
87
* external/cwe/cwe-327
9-
* @id cs/azure-storage/unsafe-usage-of-client-side-encryption-version
8+
* @id githubsecuritylab/cs/azure-storage/unsafe-usage-of-client-side-encryption-version
109
* @problem.severity error
1110
* @precision high
1211
*/

csharp/src/security/CWE-614/CookieWithoutSecure.ql

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,8 @@
66
* @kind problem
77
* @problem.severity error
88
* @precision high
9-
* @id cs/web/cookie-secure-not-set
9+
* @id githubsecuritylab/cs/web/cookie-secure-not-set
1010
* @tags security
11-
* experimental
1211
* external/cwe/cwe-319
1312
* external/cwe/cwe-614
1413
*/
@@ -17,7 +16,7 @@ import csharp
1716
import semmle.code.asp.WebConfig
1817
import semmle.code.csharp.frameworks.system.Web
1918
import semmle.code.csharp.frameworks.microsoft.AspNetCore
20-
import experimental.dataflow.flowsources.AuthCookie
19+
import security.dataflow.flowsources.AuthCookie
2120

2221
from Expr secureSink
2322
where

csharp/src/security/CWE-759/HashWithoutSalt.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@
33
* @description Hashed passwords without a salt are vulnerable to dictionary attacks.
44
* @kind path-problem
55
* @problem.severity error
6-
* @id cs/hash-without-salt
6+
* @id githubsecuritylab/cs/hash-without-salt
77
* @tags security
8-
* experimental
98
* external/cwe/cwe-759
109
*/
1110

csharp/src/security/CWE-918/RequestForgery.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,8 @@
44
* @kind path-problem
55
* @problem.severity error
66
* @precision high
7-
* @id cs/request-forgery
7+
* @id githubsecuritylab/cs/request-forgery
88
* @tags security
9-
* experimental
109
* external/cwe/cwe-918
1110
*/
1211

csharp/src/security/JsonWebTokenHandler/delegated-security-validations-always-return-true.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,9 @@
44
* Higher precision version checks for exception throws, so less false positives are expected.
55
* @kind problem
66
* @tags security
7-
* experimental
87
* JsonWebTokenHandler
98
* manual-verification-required
10-
* @id cs/json-webtoken-handler/delegated-security-validations-always-return-true
9+
* @id githubsecuritylab/cs/json-webtoken-handler/delegated-security-validations-always-return-true
1110
* @problem.severity error
1211
* @precision high
1312
*/

csharp/src/security/JsonWebTokenHandler/security-validation-disabled.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,9 @@
33
* @description Check if security sensitive token validations for `JsonWebTokenHandler` are being disabled.
44
* @kind problem
55
* @tags security
6-
* experimental
76
* JsonWebTokenHandler
87
* manual-verification-required
9-
* @id cs/json-webtoken-handler/security-validations-disabled
8+
* @id githubsecuritylab/cs/json-webtoken-handler/security-validations-disabled
109
* @problem.severity error
1110
* @precision high
1211
*/

csharp/src/security/Serialization/DefiningDatasetRelatedType.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@
33
* @description Defining a class that inherits or has a property derived from the obsolete DataSet or DataTable types may lead to the usage of dangerous functionality. Please visit https://go.microsoft.com/fwlink/?linkid=2132227 for details.
44
* @kind problem
55
* @problem.severity warning
6-
* @id cs/dataset-serialization/defining-dataset-related-type
6+
* @id githubsecuritylab/cs/dataset-serialization/defining-dataset-related-type
77
* @tags security
8-
* experimental
98
*/
109

1110
import csharp

csharp/src/security/Serialization/DefiningPotentiallyUnsafeXmlSerializer.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,8 @@
44
* @kind problem
55
* @problem.severity error
66
* @precision medium
7-
* @id cs/dataset-serialization/defining-potentially-unsafe-xml-serializer
7+
* @id githubsecuritylab/cs/dataset-serialization/defining-potentially-unsafe-xml-serializer
88
* @tags security
9-
* experimental
109
*/
1110

1211
import csharp

csharp/src/security/Serialization/UnsafeTypeUsedDataContractSerializer.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,8 @@
44
* @kind problem
55
* @problem.severity error
66
* @precision medium
7-
* @id cs/dataset-serialization/unsafe-type-used-data-contract-serializer
7+
* @id githubsecuritylab/cs/dataset-serialization/unsafe-type-used-data-contract-serializer
88
* @tags security
9-
* experimental
109
*/
1110

1211
import csharp

csharp/src/security/Serialization/XmlDeserializationWithDataSet.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,8 @@
44
* @kind problem
55
* @problem.severity error
66
* @precision medium
7-
* @id cs/dataset-serialization/xml-deserialization-with-dataset
7+
* @id githubsecuritylab/cs/dataset-serialization/xml-deserialization-with-dataset
88
* @tags security
9-
* experimental
109
*/
1110

1211
import csharp

csharp/src/security/backdoor/DangerousNativeFunctionCall.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,8 @@
44
* @kind problem
55
* @problem.severity warning
66
* @precision low
7-
* @id cs/backdoor/dangerous-native-functions
7+
* @id githubsecuritylab/cs/backdoor/dangerous-native-functions
88
* @tags security
9-
* experimental
109
* solorigate
1110
*/
1211

csharp/src/security/backdoor/PotentialTimeBomb.ql

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,10 @@
22
* @name Potential Timebomb
33
* @description If there is data flow from a file's last modification date and an offset to a condition statement, this could trigger a "time bomb".
44
* @kind path-problem
5-
* @precision Low
5+
* @precision low
66
* @problem.severity warning
7-
* @id cs/backdoor/potential-time-bomb
7+
* @id githubsecuritylab/cs/backdoor/potential-time-bomb
88
* @tags security
9-
* experimental
109
* solorigate
1110
*/
1211

csharp/src/security/backdoor/ProcessNameToHashTaintFlow.ql

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,10 @@
33
* @description Flow from a function retrieving process name to a hash function.
44
* @kind path-problem
55
* @tags security
6-
* experimental
76
* solorigate
87
* @problem.severity warning
98
* @precision medium
10-
* @id cs/backdoor/process-name-to-hash-function
9+
* @id githubsecuritylab/cs/backdoor/process-name-to-hash-function
1110
*/
1211

1312
import csharp

0 commit comments

Comments
 (0)