Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 3e8748e

Browse files
Jami CogswellJami Cogswell
authored andcommitted
add path-graph back to query alerts
1 parent 26f4abf commit 3e8748e

2 files changed

Lines changed: 10 additions & 10 deletions

File tree

java/ql/lib/semmle/code/java/security/InsufficientKeySizeQuery.qll

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,11 @@
22

33
import semmle.code.java.security.Encryption
44
import semmle.code.java.dataflow.DataFlow
5-
import semmle.code.java.dataflow.DataFlow2
65

76
/**
87
* An Asymmetric (RSA, DSA, DH) key length data flow tracking configuration.
98
*/
10-
class AsymmetricNonECKeyTrackingConfiguration extends DataFlow2::Configuration {
9+
class AsymmetricNonECKeyTrackingConfiguration extends DataFlow::Configuration {
1110
AsymmetricNonECKeyTrackingConfiguration() { this = "AsymmetricNonECKeyTrackingConfiguration" }
1211

1312
override predicate isSource(DataFlow::Node source) {
@@ -52,7 +51,7 @@ class AsymmetricNonECKeyTrackingConfiguration extends DataFlow2::Configuration {
5251
/**
5352
* An Asymmetric (EC) key length data flow tracking configuration.
5453
*/
55-
class AsymmetricECKeyTrackingConfiguration extends DataFlow2::Configuration {
54+
class AsymmetricECKeyTrackingConfiguration extends DataFlow::Configuration {
5655
AsymmetricECKeyTrackingConfiguration() { this = "AsymmetricECKeyTrackingConfiguration" }
5756

5857
override predicate isSource(DataFlow::Node source) {
@@ -88,7 +87,7 @@ class AsymmetricECKeyTrackingConfiguration extends DataFlow2::Configuration {
8887
/**
8988
* A Symmetric (AES) key length data flow tracking configuration.
9089
*/
91-
class SymmetricKeyTrackingConfiguration extends DataFlow2::Configuration {
90+
class SymmetricKeyTrackingConfiguration extends DataFlow::Configuration {
9291
SymmetricKeyTrackingConfiguration() { this = "SymmetricKeyTrackingConfiguration" }
9392

9493
override predicate isSource(DataFlow::Node source) {

java/ql/src/Security/CWE/CWE-326/InsufficientKeySize.ql

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Insufficient key size used with a cryptographic algorithm
33
* @description Using cryptographic algorithms with too small of a key size can
44
* allow an attacker to compromise security.
5-
* @kind problem
5+
* @kind path-problem
66
* @problem.severity error
77
* @security-severity 7.5
88
* @precision high
@@ -13,10 +13,11 @@
1313

1414
import java
1515
import semmle.code.java.security.InsufficientKeySizeQuery
16+
import DataFlow::PathGraph
1617

17-
from DataFlow::Node source, DataFlow::Node sink
18+
from DataFlow::PathNode source, DataFlow::PathNode sink
1819
where
19-
exists(AsymmetricNonECKeyTrackingConfiguration config1 | config1.hasFlow(source, sink)) or
20-
exists(AsymmetricECKeyTrackingConfiguration config2 | config2.hasFlow(source, sink)) or
21-
exists(SymmetricKeyTrackingConfiguration config3 | config3.hasFlow(source, sink))
22-
select sink, "This $@ is too small.", source, "key size"
20+
exists(AsymmetricNonECKeyTrackingConfiguration config1 | config1.hasFlowPath(source, sink)) or
21+
exists(AsymmetricECKeyTrackingConfiguration config2 | config2.hasFlowPath(source, sink)) or
22+
exists(SymmetricKeyTrackingConfiguration config3 | config3.hasFlowPath(source, sink))
23+
select sink.getNode(), source, sink, "This $@ is too small.", source.getNode(), "key size"

0 commit comments

Comments
 (0)