Skip to content

Commit 49c2398

Browse files
author
Shati Patel
committed
QL docs: Update links to blog/demos
1 parent c73ae53 commit 49c2398

5 files changed

Lines changed: 8 additions & 9 deletions

File tree

docs/language/learn-ql/ql-training.rst

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ CodeQL and variant analysis
66

77
`Variant analysis <https://semmle.com/variant-analysis>`__ is the process of using a known vulnerability as a seed to find similar problems in your code. Security engineers typically perform variant analysis to identify possible vulnerabilities and to ensure that these threats are properly fixed across multiple code bases.
88

9-
`CodeQL <https://semmle.com/ql>`__ is the code analysis engine that underpins LGTM, Semmle's community driven security analysis platform. Together, CodeQL and LGTM provide continuous monitoring and scalable variant analysis for your projects, even if you don’t have your own team of dedicated security engineers. You can read more about using CodeQL and LGTM in variant analysis in the `Semmle blog <https://blog.semmle.com/tags/variant-analysis>`__.
9+
`CodeQL <https://semmle.com/ql>`__ is the code analysis engine that underpins LGTM, Semmle's community driven security analysis platform. Together, CodeQL and LGTM provide continuous monitoring and scalable variant analysis for your projects, even if you don’t have your own team of dedicated security engineers. You can read more about using CodeQL and LGTM in variant analysis on the `Security Lab research page <https://securitylab.github.com/research>`__.
1010

1111
CodeQL is easy to learn, and exploring code using CodeQL is the most efficient way to perform variant analysis.
1212

@@ -62,5 +62,4 @@ More resources
6262

6363
- If you are completely new to CodeQL, look at our introductory topics in :doc:`Learning CodeQL <index>`.
6464
- To find more detailed information about how to write queries for specific languages, visit the links in :ref:`Writing CodeQL queries <writing-ql-queries>`.
65-
- To read more about how CodeQL queries have been used in Semmle's security research, and to read about new CodeQL developments, visit the `Semmle blog <https://blog.semmle.com>`__.
66-
- Find more examples of queries written by Semmle's own security researchers in the `Semmle Demos repository <https://github.com/semmle/demos>`__ on GitHub.
65+
- To see examples of CodeQL queries that have been used to find security vulnerabilities and bugs in open-source software projects, visit the `GitHub Security Lab website <https://securitylab.github.com/research>`__ and the associated `repository <https://github.com/github/security-lab>`__.

docs/language/learn-ql/writing-queries/path-queries.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The easiest way to get started writing your own path query is to modify one of t
3737
- `JavaScript path queries <https://help.semmle.com/wiki/label/js/path-problem>`__
3838
- `Python path queries <https://help.semmle.com/wiki/label/python/path-problem>`__
3939

40-
The Security lab researchers have used path queries to find security vulnerabilities in various open source projects. To see articles describing how these queries were written, as well as other posts describing other aspects of security research such as exploiting vulnerabilities, see the `GitHub Security Lab website <https://securitylab.github.com/research>`__.
40+
The Security Lab researchers have used path queries to find security vulnerabilities in various open source projects. To see articles describing how these queries were written, as well as other posts describing other aspects of security research such as exploiting vulnerabilities, see the `GitHub Security Lab website <https://securitylab.github.com/research>`__.
4141

4242
Constructing a path query
4343
=========================

docs/language/ql-training/cpp/snprintf.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ RCE in rsyslog
6565
}
6666
6767
- Disclosed as `CVE-2018-1000140 <https://nvd.nist.gov/vuln/detail/CVE-2018-1000140>`__.
68-
- Blog post: `https://blog.semmle.com/librelp-buffer-overflow-cve-2018-1000140/ <https://blog.semmle.com/librelp-buffer-overflow-cve-2018-1000140/>`__.
68+
- Blog post: https://securitylab.github.com/research/librelp-buffer-overflow-cve-2018-1000140
6969

7070
Finding the RCE yourself
7171
========================

docs/language/ql-training/java/apache-struts-java.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ RCE in Apache Struts
5858

5959
- Disclosed as `CVE-2017-9805 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9805>`__
6060

61-
- Blog post: https://blog.semmle.com/apache-struts-vulnerability-cve-2017-9805/
61+
- Blog post: https://securitylab.github.com/research/apache-struts-vulnerability-cve-2017-9805
6262

6363
Finding the RCE yourself
6464
========================
@@ -134,4 +134,4 @@ Model answer, step 4
134134
and sink.getNode() instanceof UnsafeDeserializationSink
135135
select sink.getNode().(UnsafeDeserializationSink).getMethodAccess(), source, sink, "Unsafe deserialization of $@.", source, "user input"
136136
137-
More full-featured version: https://github.com/Semmle/demos/tree/master/ql_demos/java/Apache_Struts_CVE-2017-9805
137+
More full-featured version: https://github.com/github/security-lab/tree/master/CodeQL_Queries/java/Apache_Struts_CVE-2017-9805

docs/language/ql-training/java/global-data-flow-java.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,8 @@ Code injection in Apache struts
5353

5454
.. note::
5555

56-
More details on the CVE can be found here: https://blog.semmle.com/apache-struts-CVE-2018-11776/ and
57-
https://github.com/Semmle/demos/tree/master/ql_demos/java/Apache_Struts_CVE-2018-11776
56+
More details on the CVE can be found here: https://securitylab.github.com/research/apache-struts-CVE-2018-11776 and
57+
https://github.com/github/security-lab/tree/master/CodeQL_Queries/java/Apache_Struts_CVE-2018-11776
5858

5959
More details on OGNL can be found here: https://commons.apache.org/proper/commons-ognl/
6060

0 commit comments

Comments
 (0)