Blog
Sonar's latest blog posts
What Code Issues Caused the CrowdStrike Outage?
This blog post takes a look at the potential code issues behind the recent global CrowdStrike outage.
![https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/7b69d1cd-74f7-4610-a793-6bd3e35737fa/crowdstrike_blog_featured_2x.webp](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/7b69d1cd-74f7-4610-a793-6bd3e35737fa/crowdstrike_blog_featured_2x.webp?w=1201&h=1201&auto=format&fit=crop)
![In April 2021, we updated our JavaScript and TypeScript SAST engines to explore more execution flows, increase performance and improve overall accuracy. It now goes far beyond what we did...](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/16281bc0-1fb7-407d-b869-63dfcf4622d5/cover-1a134350-673f-470c-9ea5-1d28507a6d76_owasp_juice_shop%25402x.png?w=325&h=200&auto=format&fit=crop)
What to expect from JavaScript/TypeScript analysis on OWASP JuiceShop
In April 2021, we updated our JavaScript and TypeScript SAST engines to explore more execution flows, increase performance and improve overall accuracy. It now goes far beyond what we did in the past for these languages. With this post, we’re going to tell you what you can expect for these languages, and more specifically which vulnerabilities can be detected.
Read Blog post >
![SonarQube 8.9 Long Term Support (LTS) is officially here! Check out this list of tips & tricks on how to upgrade your environment from start to finish.](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/ef0ec1ec-f103-4a5b-a2ec-02d8d7cf235c/cover-f3a85109-5370-45ab-ae8f-d9f92fddf16d_lts-upgrade.png?w=325&h=200&auto=format&fit=crop)
SonarQube 8.9 LTS: 3 steps to a smooth upgrade
SonarQube 8.9 Long Term Support (LTS) is officially here! Check out this list of tips & tricks on how to upgrade your environment from start to finish.
Read Blog post >
![We recently discovered a vulnerability in Composer, the main package manager for PHP, and were able to use it to take over the central repository, packagist.org.](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/581c73b8-2b6e-4c61-94c1-2303689d6f96/cover-467458c0-61ba-41e5-ad9c-caf6910e9413_php.png?w=325&h=200&auto=format&fit=crop)
PHP Supply Chain Attack on Composer
We recently discovered a vulnerability in Composer, the main package manager for PHP, and were able to use it to take over the central repository, packagist.org.
Read Blog post >
![In this blog post we analyze a XXE vulnerability that our analyzers discovered in WordPress, the most popular CMS, and what PHP 8 developers can learn from it.](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/0fbcda2d-af08-4b1e-af0d-c622a23093a6/cover-137de1ae-12c6-4060-a4e2-417adafe5d43_Wordpress.png?w=325&h=200&auto=format&fit=crop)
WordPress 5.7 XXE Vulnerability
In this blog post we analyze a XXE vulnerability that our analyzers discovered in WordPress, the most popular CMS, and what PHP 8 developers can learn from it.
Read Blog post >
![Our security research team discovered multiple code vulnerabilities in the NSA's Java application Emissary. Find out more about these issues and related attacks.](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/74a10024-5c8b-4bf5-98f7-912db043ad58/cover-70ba2589-455f-41cb-87a0-820e0765a379_NSA_emissary_blogpost%25402x.png?w=325&h=200&auto=format&fit=crop)
Code Vulnerabilities in NSA Application Revealed
Our security research team discovered multiple code vulnerabilities in the NSA's Java application Emissary. Find out more about these issues and related attacks.
Read Blog post >
![Last September, we announced that mono-repository support was added for GitHub and Azure DevOps Services. The good news is: mono-repository support is now also available for Bitbucket Clo...](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/a4859620-f352-4192-9251-0df50527361d/cover-147699d7-60e3-40a1-b011-bc4c47b793aa_SC_BB_Monorep%25402x.png?w=325&h=200&auto=format&fit=crop)
Mono-repository support for Bitbucket Cloud now available for SonarCloud!
Last September, we announced that mono-repository support was added for GitHub and Azure DevOps Services. The good news is: mono-repository support is now also available for Bitbucket Cloud! See what it brings and how you can configure it in SonarCloud.
Read Blog post >
![https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/b267f59e-e50c-4d2c-a991-d2d37674b63a/My-Support-Engineer-Journey_Blog-Hero%402x.png](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/b267f59e-e50c-4d2c-a991-d2d37674b63a/My-Support-Engineer-Journey_Blog-Hero%402x.png?w=325&h=200&auto=format&fit=crop)
My Support Engineer Journey at SonarSource
What does a Support Engineer do and how could it ever be interesting? Here we share more about a unique and rewarding journey in this role at SonarSource that will help you understand more about the job and opportunity.
Read Blog post >
![Today SonarSource is pleased to share a guest contribution to our Code Security blog series about learnings from a chain of serious vulnerabilities in MyBB.](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/5e4d7d7b-2d3a-4978-9a5b-f2f25984affb/cover-3c19f20f-8ce8-46a2-90f9-8038c5e16e7c_myBB_SonarSource%25402x.png?w=325&h=200&auto=format&fit=crop)
MyBB Remote Code Execution Chain
Today SonarSource is pleased to share a guest contribution to our Code Security blog series about learnings from a chain of serious vulnerabilities in MyBB.
Read Blog post >
![Our vulnerability researchers found critical code vulnerabilities in a popular Python application that can be exploited remotely, even when the application instance is hosted locally.](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/1062b67f-394d-45a0-8383-ef7f2ba0b7ed/cover-55a7eab2-82af-4c50-a1d9-39e948c78128_local_stack_python.png?w=325&h=200&auto=format&fit=crop)
Hack the Stack with LocalStack: Code Vulnerabilities Explained
Our vulnerability researchers found critical code vulnerabilities in a popular Python application that can be exploited remotely, even when the application instance is hosted locally.
Read Blog post >
![Due to the way regular expression matching is implemented in Java (and many other languages/libraries), matching a pattern may - depending on the regex - require stack space proportional ...](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/138905ad-1663-46bc-87e2-903683c5ba53/cover-d3a34893-54f4-42bb-9453-bc70e39868ae_03_java_regex_rules%25402x.png?w=325&h=200&auto=format&fit=crop)
Crafting regexes to avoid stack overflows
Due to the way regular expression matching is implemented in Java (and many other languages/libraries), matching a pattern may - depending on the regex - require stack space proportional to the length of the input. This means large inputs could cause the program to crash with a `StackOverflowException` when you try to use the regex.
Read Blog post >
![Regular expressions pack a lot of power into terse little packages and unfortunately that introduces a lot of room for error. This post talks about regex boundaries, another feature that ...](https://assets-eu-01.kc-usercontent.com:443/275a16f7-9b36-0172-ed6f-fce50dc34f53/42ce6cbf-2454-4574-8c72-cbe70cdc144b/cover-2adaddc9-a4d8-41b0-a7a7-6ebb4ebcbdaf_02_java_regex_rules%25402x.png?w=325&h=200&auto=format&fit=crop)
Setting the right (regex) boundaries is important
Regular expressions pack a lot of power into terse little packages and unfortunately that introduces a lot of room for error. This post talks about regex boundaries, another feature that can lead to bugs when used incorrectly, and a rule of ours that can help you avoid such issues. it also covers about complexity and maintainability in regular expressions and our rule to help you find regular expressions that are too complex.
Read Blog post >