-
Notifications
You must be signed in to change notification settings - Fork 2k
Rust: Add cleartext transmission query #19000
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
4de69c7
1ae28c7
fb71866
0bf8265
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,7 @@ | ||
| # Models for the `url` crate | ||
| extensions: | ||
| - addsTo: | ||
| pack: codeql/rust-all | ||
| extensible: summaryModel | ||
| data: | ||
| - ["repo:https://github.com/servo/rust-url:url", "<crate::Url>::parse", "Argument[0].Reference", "ReturnValue.Field[crate::result::Result::Ok(0)]", "taint", "manual"] |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,38 @@ | ||
| /** | ||
| * Provides classes and predicates for reasoning about cleartext transmission | ||
| * vulnerabilities. | ||
| */ | ||
|
|
||
| private import codeql.util.Unit | ||
| private import rust | ||
| private import codeql.rust.dataflow.DataFlow | ||
| private import codeql.rust.dataflow.FlowSink | ||
|
|
||
| /** | ||
| * A data flow sink for cleartext transmission vulnerabilities. That is, | ||
| * a `DataFlow::Node` of something that is transmitted over a network. | ||
| */ | ||
| abstract class CleartextTransmissionSink extends DataFlow::Node { } | ||
|
|
||
| /** | ||
| * A barrier for cleartext transmission vulnerabilities. | ||
| */ | ||
| abstract class CleartextTransmissionBarrier extends DataFlow::Node { } | ||
|
|
||
| /** | ||
| * A unit class for adding additional flow steps. | ||
| */ | ||
| class CleartextTransmissionAdditionalFlowStep extends Unit { | ||
| /** | ||
| * Holds if the step from `node1` to `node2` should be considered a flow | ||
| * step for paths related to cleartext transmission vulnerabilities. | ||
| */ | ||
| abstract predicate step(DataFlow::Node nodeFrom, DataFlow::Node nodeTo); | ||
| } | ||
|
|
||
| /** | ||
| * A sink defined through MaD. | ||
| */ | ||
| private class MadCleartextTransmissionSink extends CleartextTransmissionSink { | ||
| MadCleartextTransmissionSink() { sinkNode(this, "transmission") } | ||
| } | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,15 @@ | ||
| # THIS FILE IS AN AUTO-GENERATED MODELS AS DATA FILE. DO NOT EDIT. | ||
| extensions: | ||
| - addsTo: | ||
| pack: codeql/rust-all | ||
| extensible: sinkModel | ||
| data: | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::async_impl::client::Client>::delete", "Argument[0]", "transmission", "df-generated"] | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::async_impl::client::Client>::get", "Argument[0]", "transmission", "df-generated"] | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::async_impl::client::Client>::head", "Argument[0]", "transmission", "df-generated"] | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::async_impl::client::Client>::patch", "Argument[0]", "transmission", "df-generated"] | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::async_impl::client::Client>::post", "Argument[0]", "transmission", "df-generated"] | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::async_impl::client::Client>::put", "Argument[0]", "transmission", "df-generated"] | ||
|
geoffw0 marked this conversation as resolved.
|
||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::connect::Connector as crate::Service>::call", "Argument[0]", "log-injection", "df-generated"] | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "<crate::connect::ConnectorService as crate::Service>::call", "Argument[0]", "log-injection", "df-generated"] | ||
| - ["repo:https://github.com/seanmonstar/reqwest:reqwest", "crate::get", "Argument[0]", "transmission", "df-generated"] | ||
|
geoffw0 marked this conversation as resolved.
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,47 @@ | ||
| <!DOCTYPE qhelp PUBLIC "-//Semmle//qhelp//EN" "qhelp.dtd"> | ||
| <qhelp> | ||
| <overview> | ||
|
|
||
| <p> | ||
| Sensitive information that is transmitted without encryption may be accessible | ||
| to an attacker. | ||
| </p> | ||
|
|
||
| </overview> | ||
| <recommendation> | ||
|
|
||
| <p> | ||
| Ensure that sensitive information is always encrypted before being transmitted | ||
| over the network. In general, decrypt sensitive information only at the point | ||
| where it is necessary for it to be used in cleartext. Avoid transmitting | ||
| sensitive information when it is not necessary to. | ||
| </p> | ||
|
|
||
| </recommendation> | ||
| <example> | ||
|
|
||
| <p> | ||
| The following example shows three cases of transmitting information. In the | ||
| 'BAD' case, the data transmitted is sensitive (a password) and is not encrypted | ||
| as it occurs as a URL parameter. In the 'GOOD' cases, the data is either not | ||
| sensitive, or is protected with encryption. When encryption is used, take care | ||
| to select a secure modern encryption algorithm, and put suitable key management | ||
| practices into place. | ||
| </p> | ||
|
|
||
| <sample src="CleartextTransmission.rs" /> | ||
|
|
||
| </example> | ||
| <references> | ||
|
|
||
| <li> | ||
| OWASP Top 10:2021: | ||
| <a href="https://owasp.org/Top10/A02_2021-Cryptographic_Failures/">A02:2021 � Cryptographic Failures</a>. | ||
|
paldepind marked this conversation as resolved.
Outdated
paldepind marked this conversation as resolved.
Outdated
|
||
| </li> | ||
| <li> | ||
| OWASP: | ||
| <a href="https://cheatsheetseries.owasp.org/cheatsheets/Key_Management_Cheat_Sheet.html">Key Management Cheat Sheet</a>. | ||
| </li> | ||
|
|
||
| </references> | ||
| </qhelp> | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,50 @@ | ||
| /** | ||
| * @name Cleartext transmission of sensitive information | ||
| * @description Transmitting sensitive information across a network in | ||
| * cleartext can expose it to an attacker. | ||
| * @kind path-problem | ||
| * @problem.severity warning | ||
| * @security-severity 7.5 | ||
| * @precision high | ||
| * @id rust/cleartext-transmission | ||
| * @tags security | ||
| * external/cwe/cwe-319 | ||
| */ | ||
|
|
||
| import rust | ||
| import codeql.rust.dataflow.DataFlow | ||
| import codeql.rust.security.SensitiveData | ||
| import codeql.rust.dataflow.TaintTracking | ||
| import codeql.rust.security.CleartextTransmissionExtensions | ||
|
|
||
| /** | ||
| * A taint configuration from sensitive information to expressions that are | ||
| * transmitted over a network. | ||
| */ | ||
| module CleartextTransmissionConfig implements DataFlow::ConfigSig { | ||
| predicate isSource(DataFlow::Node node) { node instanceof SensitiveData } | ||
|
|
||
| predicate isSink(DataFlow::Node node) { node instanceof CleartextTransmissionSink } | ||
|
|
||
| predicate isBarrier(DataFlow::Node barrier) { barrier instanceof CleartextTransmissionBarrier } | ||
|
|
||
| predicate isAdditionalFlowStep(DataFlow::Node nodeFrom, DataFlow::Node nodeTo) { | ||
| any(CleartextTransmissionAdditionalFlowStep s).step(nodeFrom, nodeTo) | ||
| } | ||
|
|
||
| predicate isBarrierIn(DataFlow::Node node) { | ||
| // make sources barriers so that we only report the closest instance | ||
| isSource(node) | ||
| } | ||
| } | ||
|
|
||
| module CleartextTransmissionFlow = TaintTracking::Global<CleartextTransmissionConfig>; | ||
|
|
||
| import CleartextTransmissionFlow::PathGraph | ||
|
|
||
| from CleartextTransmissionFlow::PathNode sourceNode, CleartextTransmissionFlow::PathNode sinkNode | ||
| where CleartextTransmissionFlow::flowPath(sourceNode, sinkNode) | ||
| select sinkNode.getNode(), sourceNode, sinkNode, | ||
| "The operation '" + sinkNode.getNode().toString() + | ||
| "', transmits data which may contain unencrypted sensitive data from $@.", sourceNode, | ||
| sourceNode.getNode().toString() | ||
|
geoffw0 marked this conversation as resolved.
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,15 @@ | ||
| func getData() { | ||
| // ... | ||
|
|
||
| // GOOD: not sensitive information | ||
| let body = reqwest::get("https://example.com/data").await?.text().await?; | ||
|
|
||
| // BAD: sensitive information sent in cleartext | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Strictly speaking I think HTTPS URL parameters are encrypted as part of the HTTPS protocol - though there's a significant danger they get logged outside of that encrypted tunnel, e.g. in a cache or log, or possibly the connection isn't as secure as it seems (as described in the first reference linked from the
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Oh, I actually thought the whole URL would be sent unencrypted. TIL. Whether to change the description or use
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Oh I'm definitely happy that we catch these results, but in the
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm happy with the changes you've made already, by the way. If you're happy to you can ask for a docs review. |
||
| let body = reqwest::get(format!("https://example.com/data?password={password}")).await?.text().await?; | ||
|
|
||
| // GOOD: encrypted sensitive information sent | ||
| let encryptedPassword = encrypt(password, encryptionKey); | ||
| let body = reqwest::get(format!("https://example.com/data?password={encryptedPassword}")).await?.text().await?; | ||
|
geoffw0 marked this conversation as resolved.
Outdated
|
||
|
|
||
| // ... | ||
| } | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this ought to extend
QuerySink::Rangeinstead (cc @geoffw0 ).There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes it should, but that class is new. I'll make the change and check all the other merged queries do this now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here: #19103