Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

...

 

 

New version of CQM (2.4.0) and Kiuwan Engine

 

Info


Main features of this release are:

Kiuwan CQM (v2.3.0) and Engine
  • 14 New PL-SQL security rules

    • Support for KOTLIN programming language
    • Support for RM/Cobol dialect
    • Duplicated Code rules are not longer mandatory

     

    9 New Transact-SQL security rules

    CQM is the default Model (i.e. a concrete set of active and pre-configured rules): 

    • If you are using CQM,
      • new rules will automatically become active and will be applied to new analyses
    • If you are using your own custom model, your model remains unchaged, but you can modify it and activate the new rules (in case you want to be applied to your code).

    You can find new rules by comparing this release of CQM against previous version.  A detailed description of the behavior of these new rules is available in rule’s description.

     

    This new version of Kiuwan Engine  incorporates bug fixes, performance and reliability improvements in rules and parsers.

    Kiuwan Engine is the binary code executed when an analysis is run.

    • If the engine is not blocked in your Kiuwan account, the engine will upgrade automatically to the last version of Kiuwan Engine once a new analysis is run
    • If the engine is blocked, your kiuwan engine will not be modified.

     

    Info

    new version of Kiuwan Engine has been released that incorporates bug fixes, performance and reliability improvements in rules and parsers.

    Kiuwan Engine is the binary code executed when an analysis is run.

    • If the engine is not blocked in your Kiuwan account, the engine will upgrade automatically to the last version of Kiuwan Engine once a new analysis is run
    • If the engine is blocked, your kiuwan engine will not be modified.

     

     

    Support for KOTLIN programming language

    ...

    Kotlin is a cross-platform, statically typed, general-purpose programming language with type inference and it's Google’s preferred language for Android app development since 7 May 2019

    Kotlin mainly targets is officially supported by Google for mobile development on Android. It targets the JVM, but also compiles to JavaScript or native code (via LLVM), and it's an alternative to the standard Java compiler.Kotlin is officially supported by Google for mobile development on Android.  

     

    As Kotlin is becoming a widely adopted programming language, Kiuwan now incorporates support to analyze Kotlin source files, thus searching for code and desing conditions that are indicative of security vulnerabilities.

     

    Info

    Kiuwan provides 61 Security 100 Rules specifically suited to Scala Kotlin programming language.

     

    You can find these rules going to Models Management, select CQM and search for Rules applying to Kotlin language

    Image RemovedImage Added


     

    Added Support for RM/COBOL dialect in COBOL technology.

    ...

    Support for RM/Cobol dialect has been added to current list of supported Cobol dialects. 

    All versions between 9.x to 12.16 (latest version at the moment of writing this post) have been succesfully tested. 

    Current list of supported Cobol dialects:

    • Cobol85, 
    • OS/VS Cobol II
    • Enterprise Cobol IBM Enterprise COBOL for z/OS v5ILE Cobol
    • IBM ILE COBOL 5
    • MicroFocus Cobol NetExpress 5, 
    • HP COBOL for TNS (Tandem NonStop)Cobol Tandem, 
    • AcuCOBOL-GT
    • Net Express COBOL 5 / Server Express COBOL
    • MicroFocus RM/Cobol 

    ...

    • COBOL 9.x to 12.16

     

     

    Duplicated Code rules are not longer mandatory 

    When creating a new model, it was mandatory to activate duplicated code rules (i.e. rules that check for repeated blocks in source code).

    ...

    This new Kiuwan release no longer forces duplicated code rules to be activated in your custom model.

     

     

    ==========

     

    New PL-SQL security rules

    ...

    .

    ...

     

    New Transact-SQL security rules 

    ...

    ...

     

    • Standard pseudo-random number generators cannot withstand cryptographic attacks. 
    • Denial of Service by externally controlled sleep time 
    • Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 
    • Too broad privileges granted. 
    • Avoid using an user controlled Primary Key into a query 
    • Weak cryptographic hashes cannot guarantee data integrity 
    • Weak symmetric encryption algorithm.

    ...