
org.sonar.java.checks.security.JWTWithStrongCipherCheck Maven / Gradle / Ivy
The newest version!
/*
* SonarQube Java
* Copyright (C) 2012-2025 SonarSource SA
* mailto:info AT sonarsource DOT com
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the Sonar Source-Available License Version 1, as published by SonarSource SA.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the Sonar Source-Available License for more details.
*
* You should have received a copy of the Sonar Source-Available License
* along with this program; if not, see https://sonarsource.com/license/ssal/
*/
package org.sonar.java.checks.security;
import java.util.Collections;
import java.util.List;
import org.sonar.check.Rule;
import org.sonar.java.checks.helpers.MethodTreeUtils;
import org.sonar.java.model.ExpressionUtils;
import org.sonar.plugins.java.api.IssuableSubscriptionVisitor;
import org.sonar.plugins.java.api.semantic.MethodMatchers;
import org.sonar.plugins.java.api.semantic.Symbol;
import org.sonar.plugins.java.api.tree.ExpressionTree;
import org.sonar.plugins.java.api.tree.IdentifierTree;
import org.sonar.plugins.java.api.tree.MemberSelectExpressionTree;
import org.sonar.plugins.java.api.tree.MethodInvocationTree;
import org.sonar.plugins.java.api.tree.Tree;
import org.sonar.plugins.java.api.tree.VariableTree;
@Rule(key = "S5659")
public class JWTWithStrongCipherCheck extends IssuableSubscriptionVisitor {
private static final String MESSAGE_STRONG_CIPHER = "Use only strong cipher algorithms when %s this JWT.";
private static final String AUTH0_JWT_ALGORITHM = "com.auth0.jwt.algorithms.Algorithm";
private static final MethodMatchers AUTH0_JWT_REQUIRE = MethodMatchers.create()
.ofTypes("com.auth0.jwt.JWT")
.names("require")
.addParametersMatcher(AUTH0_JWT_ALGORITHM)
.build();
private static final MethodMatchers AUTH0_JWT_SIGN = MethodMatchers.create()
.ofTypes("com.auth0.jwt.JWTCreator$Builder")
.names("sign")
.addParametersMatcher(AUTH0_JWT_ALGORITHM)
.build();
private static final MethodMatchers ALGORITHM_NONE = MethodMatchers.create()
.ofTypes(AUTH0_JWT_ALGORITHM)
.names("none")
.addWithoutParametersMatcher()
.build();
private static final MethodMatchers JWTK_JJWT_PARSE = MethodMatchers.create()
.ofTypes("io.jsonwebtoken.JwtParser")
.names("parse")
.addParametersMatcher("java.lang.String")
.build();
private static final MethodMatchers JWTK_JJWT_COMPACT = MethodMatchers.create()
.ofTypes("io.jsonwebtoken.JwtBuilder")
.names("compact")
.addWithoutParametersMatcher()
.build();
private static final MethodMatchers JWTK_JJWT_BUILDER = MethodMatchers.create()
.ofTypes("io.jsonwebtoken.Jwts")
.names("builder")
.addWithoutParametersMatcher()
.build();
private static final MethodMatchers JWTK_JJWT_SIGN_WITH = MethodMatchers.create()
.ofTypes("io.jsonwebtoken.JwtBuilder")
.names("signWith")
.withAnyParameters()
.build();
@Override
public List nodesToVisit() {
return Collections.singletonList(Tree.Kind.METHOD_INVOCATION);
}
@Override
public void visitNode(Tree tree) {
MethodInvocationTree mit = (MethodInvocationTree) tree;
handleAuth0Jwt(mit);
handleJwtkJwt(mit);
}
private void handleAuth0Jwt(MethodInvocationTree mit) {
if (AUTH0_JWT_REQUIRE.matches(mit)) {
reportIfAlgorithmIsNone(mit.arguments().get(0), "verifying the signature of");
} else if (AUTH0_JWT_SIGN.matches(mit)) {
reportIfAlgorithmIsNone(mit.arguments().get(0), "signing");
}
}
private void reportIfAlgorithmIsNone(ExpressionTree expressionTree, String action) {
if (expressionTree.is(Tree.Kind.METHOD_INVOCATION) && ALGORITHM_NONE.matches((MethodInvocationTree) expressionTree)) {
reportIssue(expressionTree, String.format(MESSAGE_STRONG_CIPHER, action));
}
}
private void handleJwtkJwt(MethodInvocationTree mit) {
if (JWTK_JJWT_PARSE.matches(mit)) {
reportIssue(ExpressionUtils.methodName(mit), "The JWT signature (JWS) should be verified before using this token.");
} else if (JWTK_JJWT_COMPACT.matches(mit) && !isSigned(mit)) {
reportIssue(ExpressionUtils.methodName(mit), "Sign this token using a strong cipher algorithm.");
}
}
private static boolean isSigned(MethodInvocationTree mit) {
if (JWTK_JJWT_SIGN_WITH.matches(mit)) {
return true;
}
if (JWTK_JJWT_BUILDER.matches(mit)) {
// We reach the creation of the builder without signing the token
return false;
}
ExpressionTree methodSelect = mit.methodSelect();
if (methodSelect.is(Tree.Kind.MEMBER_SELECT)) {
ExpressionTree expression = ((MemberSelectExpressionTree) methodSelect).expression();
if (expression.is(Tree.Kind.METHOD_INVOCATION)) {
return isSigned((MethodInvocationTree) expression);
} else if (expression.is(Tree.Kind.IDENTIFIER)) {
Symbol symbol = ((IdentifierTree) expression).symbol();
return symbol.usages().stream().anyMatch(JWTWithStrongCipherCheck::canSignToken) || declarationIsSigned(symbol);
}
}
// The token is created somewhere else, we consider it as signed to avoid FP.
return true;
}
private static boolean canSignToken(IdentifierTree tokenIdentifier) {
Tree parent = tokenIdentifier.parent();
// When given as argument, we consider it as signed to avoid FP.
return (parent != null && parent.is(Tree.Kind.ARGUMENTS)) ||
MethodTreeUtils.subsequentMethodInvocation(tokenIdentifier, JWTK_JJWT_SIGN_WITH).isPresent();
}
private static boolean declarationIsSigned(Symbol symbol) {
if (symbol.isLocalVariable()) {
Tree declaration = symbol.declaration();
if (declaration instanceof VariableTree variableTree) {
ExpressionTree initializer = variableTree.initializer();
return initializer instanceof MethodInvocationTree methodInvocationTree && isSigned(methodInvocationTree);
}
}
// Can be signed anywhere (field, other file), we consider it as signed
return true;
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy