Skip to content

Commit 36bfa53

Browse files
authored
Merge pull request #3636 from semgrep/merge-develop-to-release
Merge Develop into Release
2 parents e250c42 + 4a387a2 commit 36bfa53

File tree

10 files changed

+38
-14
lines changed

10 files changed

+38
-14
lines changed

Pipfile.lock

Lines changed: 4 additions & 4 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

generic/secrets/gitleaks/generic-api-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ rules:
3838
- "*bundle.js"
3939
- "*pnpm-lock*"
4040
- "*Podfile.lock"
41-
- "*/openssl/*.h"
41+
- "**/*/openssl/*.h"
4242
- "*.xcscmblueprint"
4343
patterns:
4444
# The original regex from gitleaks is in this rule https://semgrep.dev/playground/s/57qk (but its very noisy) even with our entropy analyzer

generic/secrets/security/detected-artifactory-password.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ rules:
2121
- "*bundle.js"
2222
- "*pnpm-lock*"
2323
- "*Podfile.lock"
24-
- "*/openssl/*.h"
24+
- "**/*/openssl/*.h"
2525
- "*.xcscmblueprint"
2626
message: Artifactory token detected
2727
severity: ERROR

generic/secrets/security/detected-artifactory-token.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ rules:
1616
- "*bundle.js"
1717
- "*pnpm-lock*"
1818
- "*Podfile.lock"
19-
- "*/openssl/*.h"
19+
- "**/*/openssl/*.h"
2020
- "*.xcscmblueprint"
2121
- "*cargo.lock"
2222
message: Artifactory token detected

generic/secrets/security/detected-sonarqube-docs-api-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ rules:
1616
- "*bundle.js"
1717
- "*pnpm-lock*"
1818
- "*Podfile.lock"
19-
- "*/openssl/*.h"
19+
- "**/*/openssl/*.h"
2020
- "*.xcscmblueprint"
2121
metadata:
2222
cwe:

java/lang/security/audit/crypto/use-of-md5.fixed.java

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,20 @@ public byte[] bad1(String password) {
1111
}
1212

1313
public byte[] bad2(String password) {
14+
// ruleid: use-of-md5
15+
MessageDigest md5Digest = MessageDigest.getInstance("SHA-512");
16+
md5Digest.update(password.getBytes());
17+
byte[] hashValue = md5Digest.digest();
18+
return hashValue;
19+
}
20+
21+
public byte[] bad3(String password) {
1422
// ok: use-of-md5
1523
byte[] hashValue = DigestUtils.getMd5Digest().digest(password.getBytes());
1624
return hashValue;
1725
}
1826

19-
public void bad3() {
27+
public void bad4() {
2028
// ruleid: use-of-md5
2129
java.security.MessageDigest md = java.security.MessageDigest.getInstance("SHA-512");
2230
byte[] input = {(byte) '?'};

java/lang/security/audit/crypto/use-of-md5.java

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,20 @@ public byte[] bad1(String password) {
1111
}
1212

1313
public byte[] bad2(String password) {
14+
// ruleid: use-of-md5
15+
MessageDigest md5Digest = MessageDigest.getInstance("md5");
16+
md5Digest.update(password.getBytes());
17+
byte[] hashValue = md5Digest.digest();
18+
return hashValue;
19+
}
20+
21+
public byte[] bad3(String password) {
1422
// ok: use-of-md5
1523
byte[] hashValue = DigestUtils.getMd5Digest().digest(password.getBytes());
1624
return hashValue;
1725
}
1826

19-
public void bad3() {
27+
public void bad4() {
2028
// ruleid: use-of-md5
2129
java.security.MessageDigest md = java.security.MessageDigest.getInstance("MD5");
2230
byte[] input = {(byte) '?'};

java/lang/security/audit/crypto/use-of-md5.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ rules:
3030
java.security.MessageDigest.getInstance($ALGO, ...);
3131
- metavariable-regex:
3232
metavariable: "$ALGO"
33-
regex: (.MD5.)
33+
regex: (?i)(.MD5.)
3434
- focus-metavariable: $ALGO
3535
fix: |
3636
"SHA-512"

php/lang/security/injection/tainted-sql-string.php

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,14 @@ function test4() {
3131
return $info;
3232
}
3333

34+
function test5() {
35+
// ruleid: tainted-sql-string
36+
$query = "
37+
SELECT * FROM table WHERE Id = '".$_GET['url']."'";
38+
$info = mysql_query($query);
39+
return $info;
40+
}
41+
3442
// True Negatives
3543

3644
function test1() {

php/lang/security/injection/tainted-sql-string.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,16 +46,16 @@ rules:
4646
sprintf($SQLSTR, ...)
4747
- metavariable-regex:
4848
metavariable: $SQLSTR
49-
regex: .*\b(?i)(select|delete|insert|create|update|alter|drop)\b.*
49+
regex: (?is).*\b(select|delete|insert|create|update|alter|drop)\b.*
5050
- patterns:
5151
- pattern: |
5252
"...$EXPR..."
5353
- metavariable-regex:
5454
metavariable: $EXPR
55-
regex: .*\b(?i)(select|delete|insert|create|update|alter|drop)\b.*
55+
regex: (?is).*\b(select|delete|insert|create|update|alter|drop)\b.*
5656
- patterns:
5757
- pattern: |
5858
"$SQLSTR".$EXPR
5959
- metavariable-regex:
6060
metavariable: $SQLSTR
61-
regex: .*\b(?i)(select|delete|insert|create|update|alter|drop)\b.*
61+
regex: (?is).*\b(select|delete|insert|create|update|alter|drop)\b.*

0 commit comments

Comments
 (0)