Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump semgrep from 1.85.0 to 1.86.0 #104

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Sep 9, 2024

Bumps semgrep from 1.85.0 to 1.86.0.

Release notes

Sourced from semgrep's releases.

Release v1.86.0

1.86.0 - 2024-09-04

Added

  • The taint analysis can now track method invocations on variables of an interface type, when there is a single implementation. For example, the tainted input vulnerability can now be detected in the following code:

    public interface MovieService {
      String vulnerableInjection(String input);
    }
    @Service
    public class MovieServiceImpl implements MovieService {
    @Override
    public String vulnerableInjection(String input) {
    return sink(input);
    }
    }
    @RestController("/")
    public class SpringController {
    @Autowired
    private MovieService movieService;
    @GetMapping("/pwn")
    public String pwnTest(@RequestParam("input") String taintedInput) {
    return movieService.vulnerableInjection(taintedInput);
    }
    }

    When there are multiple implementations, the taint analysis will not follow any of them. We will add handling of cases with multiple implementations in upcoming updates. (code-7434)

  • Uses of values imported via ECMAScript default imports (e.g., import example from 'mod';) can now be matched by qualified name patterns (e.g., mod.default). (code-7463)

  • Pro: taint-mode: Allow (experimental) control taint to propagate through returns.

    Now this taint rule:

    pattern-sources:
    - control: true
      pattern: taint()
    

... (truncated)

Changelog

Sourced from semgrep's changelog.

1.86.0 - 2024-09-04

Added

  • The taint analysis can now track method invocations on variables of an interface type, when there is a single implementation. For example, the tainted input vulnerability can now be detected in the following code:

    public interface MovieService {
      String vulnerableInjection(String input);
    }
    @Service
    public class MovieServiceImpl implements MovieService {
    @Override
    public String vulnerableInjection(String input) {
    return sink(input);
    }
    }
    @RestController("/")
    public class SpringController {
    @Autowired
    private MovieService movieService;
    @GetMapping("/pwn")
    public String pwnTest(@RequestParam("input") String taintedInput) {
    return movieService.vulnerableInjection(taintedInput);
    }
    }

    When there are multiple implementations, the taint analysis will not follow any of them. We will add handling of cases with multiple implementations in upcoming updates. (code-7434)

  • Uses of values imported via ECMAScript default imports (e.g., import example from 'mod';) can now be matched by qualified name patterns (e.g., mod.default). (code-7463)

  • Pro: taint-mode: Allow (experimental) control taint to propagate through returns.

    Now this taint rule:

    pattern-sources:
    - control: true
      pattern: taint()
    pattern-sinks:
    

... (truncated)

Commits
  • 8fbe3a9 chore: Bump version to 1.86.0
  • d23f4a5 Do not fallback to buildx in build-test-docker in OSS (semgrep/semgrep-propri...
  • 7731408 fix no-logs-in-libs in Memory_limit for sync-with-OSS (semgrep/semgrep-propri...
  • b178c24semgrep/semgrep-proprietary#2172
  • be48509 Fix jsonnet parse error in bump-version.jsonnet (semgrep/semgrep-proprietary#...
  • 0b09517 Add special error report for Stack_overflow in Core_scan iter_targets (semgre...
  • 3401054semgrep/semgrep-proprietary#2169
  • 4a4dfb2 Implement method name resolution for interface methods with a single implemen...
  • 2349685 chore: Temporarily gate Python libdefs behind an environment variable (semgre...
  • 2f5f797 Factorize iter_targets in Deep_scan with Core_scan (semgrep/semgrep-proprieta...
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [semgrep](https://github.com/returntocorp/semgrep) from 1.85.0 to 1.86.0.
- [Release notes](https://github.com/returntocorp/semgrep/releases)
- [Changelog](https://github.com/semgrep/semgrep/blob/develop/CHANGELOG.md)
- [Commits](semgrep/semgrep@v1.85.0...v1.86.0)

---
updated-dependencies:
- dependency-name: semgrep
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Sep 9, 2024
@rjambrecic rjambrecic closed this Sep 10, 2024
Copy link
Author

dependabot bot commented on behalf of github Sep 10, 2024

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

@dependabot dependabot bot deleted the dependabot/pip/semgrep-1.86.0 branch September 10, 2024 06:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file python Pull requests that update Python code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant