Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update semgrep requirement from <1.86,>=1.85 to >=1.85,<1.87 #821

Merged
merged 1 commit into from
Sep 5, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 5, 2024

Updates the requirements on semgrep to permit the latest version.

Release notes

Sourced from semgrep's releases.

Release v1.86.0

1.86.0 - 2024-09-04

Added

  • The taint analysis can now track method invocations on variables of an interface type, when there is a single implementation. For example, the tainted input vulnerability can now be detected in the following code:

    public interface MovieService {
      String vulnerableInjection(String input);
    }
    @Service
    public class MovieServiceImpl implements MovieService {
    @Override
    public String vulnerableInjection(String input) {
    return sink(input);
    }
    }
    @RestController("/")
    public class SpringController {
    @Autowired
    private MovieService movieService;
    @GetMapping("/pwn")
    public String pwnTest(@RequestParam("input") String taintedInput) {
    return movieService.vulnerableInjection(taintedInput);
    }
    }

    When there are multiple implementations, the taint analysis will not follow any of them. We will add handling of cases with multiple implementations in upcoming updates. (code-7434)

  • Uses of values imported via ECMAScript default imports (e.g., import example from 'mod';) can now be matched by qualified name patterns (e.g., mod.default). (code-7463)

  • Pro: taint-mode: Allow (experimental) control taint to propagate through returns.

    Now this taint rule:

    pattern-sources:
    - control: true
      pattern: taint()
    

... (truncated)

Changelog

Sourced from semgrep's changelog.

1.86.0 - 2024-09-04

Added

  • The taint analysis can now track method invocations on variables of an interface type, when there is a single implementation. For example, the tainted input vulnerability can now be detected in the following code:

    public interface MovieService {
      String vulnerableInjection(String input);
    }
    @Service
    public class MovieServiceImpl implements MovieService {
    @Override
    public String vulnerableInjection(String input) {
    return sink(input);
    }
    }
    @RestController("/")
    public class SpringController {
    @Autowired
    private MovieService movieService;
    @GetMapping("/pwn")
    public String pwnTest(@RequestParam("input") String taintedInput) {
    return movieService.vulnerableInjection(taintedInput);
    }
    }

    When there are multiple implementations, the taint analysis will not follow any of them. We will add handling of cases with multiple implementations in upcoming updates. (code-7434)

  • Uses of values imported via ECMAScript default imports (e.g., import example from 'mod';) can now be matched by qualified name patterns (e.g., mod.default). (code-7463)

  • Pro: taint-mode: Allow (experimental) control taint to propagate through returns.

    Now this taint rule:

    pattern-sources:
    - control: true
      pattern: taint()
    pattern-sinks:
    

... (truncated)

Commits
  • 8fbe3a9 chore: Bump version to 1.86.0
  • d23f4a5 Do not fallback to buildx in build-test-docker in OSS (semgrep/semgrep-propri...
  • 7731408 fix no-logs-in-libs in Memory_limit for sync-with-OSS (semgrep/semgrep-propri...
  • b178c24semgrep/semgrep-proprietary#2172
  • be48509 Fix jsonnet parse error in bump-version.jsonnet (semgrep/semgrep-proprietary#...
  • 0b09517 Add special error report for Stack_overflow in Core_scan iter_targets (semgre...
  • 3401054semgrep/semgrep-proprietary#2169
  • 4a4dfb2 Implement method name resolution for interface methods with a single implemen...
  • 2349685 chore: Temporarily gate Python libdefs behind an environment variable (semgre...
  • 2f5f797 Factorize iter_targets in Deep_scan with Core_scan (semgrep/semgrep-proprieta...
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Updates the requirements on [semgrep](https://github.com/returntocorp/semgrep) to permit the latest version.
- [Release notes](https://github.com/returntocorp/semgrep/releases)
- [Changelog](https://github.com/semgrep/semgrep/blob/develop/CHANGELOG.md)
- [Commits](semgrep/semgrep@v1.85.0...v1.86.0)

---
updated-dependencies:
- dependency-name: semgrep
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Sep 5, 2024
Copy link

sonarcloud bot commented Sep 5, 2024

@clavedeluna clavedeluna added this pull request to the merge queue Sep 5, 2024
Merged via the queue into main with commit 165b285 Sep 5, 2024
14 checks passed
@clavedeluna clavedeluna deleted the dependabot/pip/semgrep-gte-1.85-and-lt-1.87 branch September 5, 2024 14:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file python Pull requests that update Python code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant