CodeQL 2.23.6 Update: New C# Security Queries and Language Enhancements
Allison outlines CodeQL 2.23.6’s key improvements, including new C# security queries and expanded language support, enhancing GitHub code scanning’s effectiveness.
CodeQL 2.23.6 Update: New C# Security Queries and Language Enhancements
CodeQL—the static analysis engine behind GitHub code scanning—has been updated to version 2.23.6. This release delivers notable enhancements for security and development teams using GitHub and GitHub Enterprise Server (GHES).
Language and Framework Support
- Swift: Support is expanded to apps built with Swift 6.2.1.
- Rust: New models are provided for cookie-related methods in the
poemcrate.
Security Query Updates
- C#:
- The queries
cs/web/cookie-secure-not-setandcs/web/cookie-httponly-not-sethave been promoted from experimental to standard query packs. These identify cookies lacking appropriate security attributes (Secure, HttpOnly). - The Guards library now recognizes disjunctions better, improving precision for queries like
cs/constant-condition,cs/inefficient-containskey, andcs/dereferenced-value-may-be-null.
- The queries
- Rust:
- Added taint flow barriers help reduce false positives for queries such as
rust/regex-injection,rust/sql-injection, andrust/log-injection.
- Added taint flow barriers help reduce false positives for queries such as
- Java/Kotlin:
- The
security-severityscore forjava/overly-large-rangeandjava/insecure-cookieare lowered (5.0 → 4.0) to more accurately reflect risk.
- The
- JavaScript/TypeScript:
- The XSS query
js/xss-through-domhas itssecurity-severityscore raised (6.1 → 7.8), recognizing increased risk, whilejs/overly-large-rangeis reduced (5.0 → 4.0).
- The XSS query
- Python and Ruby:
- Both have the
security-severityscore foroverly-large-rangelowered (5.0 → 4.0) for better accuracy.
- Both have the
Deployment and Upgrade
- The updated queries and features are deployed automatically to GitHub code scanning users on github.com.
- The functionality is included in the upcoming GitHub Enterprise Server (GHES) 3.20 release.
- Manual upgrade instructions are provided for maintaining CodeQL on older GHES versions without internet access.
For comprehensive details on all changes, visit the CodeQL 2.23.6 changelog.
Key Takeaways:
- Improved C# cookie security analysis
- Enhanced language support for Swift, Rust, and more
- Adjusted security severity scores for greater situational accuracy
- Seamless rollout for GitHub code scanning users
This post appeared first on “The GitHub Blog”. Read the entire article here