Brendan Dolan-Gavitt commited on
Commit ·
6f30d82
1
Parent(s): e77a543
Add metadata about CodeQL queries used by Siddiq and Santos
Browse files
queryinfo/codeql_queries.jsonl
ADDED
|
@@ -0,0 +1,41 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{ "cwe": "CWE-020", "query_name": "Frequency counts for external APIs that are used with untrusted data", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020-ExternalAPIs/ExternalAPIsUsedWithUntrustedData.ql" }
|
| 2 |
+
{ "cwe": "CWE-020", "query_name": "Untrusted data passed to external API", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020-ExternalAPIs/UntrustedDataToExternalAPI.ql" }
|
| 3 |
+
{ "cwe": "CWE-020", "query_name": "Incomplete regular expression for hostnames", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020/IncompleteHostnameRegExp.ql" }
|
| 4 |
+
{ "cwe": "CWE-020", "query_name": "Incomplete URL substring sanitization", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020/IncompleteUrlSubstringSanitization.ql" }
|
| 5 |
+
{ "cwe": "CWE-020", "query_name": "Overly permissive regular expression range", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020/OverlyLargeRange.ql" }
|
| 6 |
+
{ "cwe": "CWE-022", "query_name": "Uncontrolled data used in path expression", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-022/PathInjection.ql" }
|
| 7 |
+
{ "cwe": "CWE-022", "query_name": "Arbitrary file write during tarfile extraction", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-022/TarSlip.ql" }
|
| 8 |
+
{ "cwe": "CWE-078", "query_name": "Uncontrolled command line", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-078/CommandInjection.ql" }
|
| 9 |
+
{ "cwe": "CWE-079", "query_name": "Jinja2 templating with autoescape=False", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-079/Jinja2WithoutEscaping.ql" }
|
| 10 |
+
{ "cwe": "CWE-079", "query_name": "Reflected server-side cross-site scripting", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-079/ReflectedXss.ql" }
|
| 11 |
+
{ "cwe": "CWE-089", "query_name": "SQL query built from user-controlled sources", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-089/SqlInjection.ql" }
|
| 12 |
+
{ "cwe": "CWE-090", "query_name": "LDAP query built from user-controlled sources", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-090/LdapInjection.ql" }
|
| 13 |
+
{ "cwe": "CWE-094", "query_name": "Code injection", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-094/CodeInjection.ql" }
|
| 14 |
+
{ "cwe": "CWE-116", "query_name": "Bad HTML filtering regexp", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-116/BadTagFilter.ql" }
|
| 15 |
+
{ "cwe": "CWE-117", "query_name": "Log Injection", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-117/LogInjection.ql" }
|
| 16 |
+
{ "cwe": "CWE-209", "query_name": "Information exposure through an exception", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-209/StackTraceExposure.ql" }
|
| 17 |
+
{ "cwe": "CWE-215", "query_name": "Flask app is run in debug mode", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-215/FlaskDebug.ql" }
|
| 18 |
+
{ "cwe": "CWE-285", "query_name": "PAM authorization bypass due to incorrect usage", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-285/PamAuthorization.ql" }
|
| 19 |
+
{ "cwe": "CWE-295", "query_name": "Accepting unknown SSH host keys when using Paramiko", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-295/MissingHostKeyValidation.ql" }
|
| 20 |
+
{ "cwe": "CWE-295", "query_name": "Request without certificate validation", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-295/RequestWithoutValidation.ql" }
|
| 21 |
+
{ "cwe": "CWE-312", "query_name": "Clear-text logging of sensitive information", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-312/CleartextLogging.ql" }
|
| 22 |
+
{ "cwe": "CWE-312", "query_name": "Clear-text storage of sensitive information", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-312/CleartextStorage.ql" }
|
| 23 |
+
{ "cwe": "CWE-326", "query_name": "Use of weak cryptographic key", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-326/WeakCryptoKey.ql" }
|
| 24 |
+
{ "cwe": "CWE-327", "query_name": "Use of a broken or weak cryptographic algorithm", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.ql" }
|
| 25 |
+
{ "cwe": "CWE-327", "query_name": "Default version of SSL/TLS may be insecure", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/InsecureDefaultProtocol.ql" }
|
| 26 |
+
{ "cwe": "CWE-327", "query_name": "Use of insecure SSL/TLS version", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/InsecureProtocol.ql" }
|
| 27 |
+
{ "cwe": "CWE-327", "query_name": "Use of a broken or weak cryptographic hashing algorithm on sensitive data", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/WeakSensitiveDataHashing.ql" }
|
| 28 |
+
{ "cwe": "CWE-352", "query_name": "CSRF protection weakened or disabled", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-352/CSRFProtectionDisabled.ql" }
|
| 29 |
+
{ "cwe": "CWE-377", "query_name": "Insecure temporary file", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-377/InsecureTemporaryFile.ql" }
|
| 30 |
+
{ "cwe": "CWE-502", "query_name": "Deserializing untrusted input", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-502/UnsafeDeserialization.ql" }
|
| 31 |
+
{ "cwe": "CWE-601", "query_name": "URL redirection from remote source", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-601/UrlRedirect.ql" }
|
| 32 |
+
{ "cwe": "CWE-611", "query_name": "XML external entity expansion", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-611/Xxe.ql" }
|
| 33 |
+
{ "cwe": "CWE-643", "query_name": "XPath query built from user-controlled sources", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-643/XpathInjection.ql" }
|
| 34 |
+
{ "cwe": "CWE-730", "query_name": "Polynomial regular expression used on uncontrolled data", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-730/PolynomialReDoS.ql" }
|
| 35 |
+
{ "cwe": "CWE-730", "query_name": "Inefficient regular expression", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-730/ReDoS.ql" }
|
| 36 |
+
{ "cwe": "CWE-730", "query_name": "Regular expression injection", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-730/RegexInjection.ql" }
|
| 37 |
+
{ "cwe": "CWE-732", "query_name": "Overly permissive file permissions", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-732/WeakFilePermissions.ql" }
|
| 38 |
+
{ "cwe": "CWE-776", "query_name": "XML internal entity expansion", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-776/XmlBomb.ql" }
|
| 39 |
+
{ "cwe": "CWE-798", "query_name": "Hard-coded credentials", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-798/HardcodedCredentials.ql" }
|
| 40 |
+
{ "cwe": "CWE-918", "query_name": "Full server-side request forgery", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-918/FullServerSideRequestForgery.ql" }
|
| 41 |
+
{ "cwe": "CWE-918", "query_name": "Partial server-side request forgery", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-918/PartialServerSideRequestForgery.ql" }
|