JavaScript: Make all taint-based security queries have @kind path-problem.

This commit is contained in:
Max Schaefer
2018-11-08 12:44:43 +00:00
parent 65bcf0f526
commit 60a1357092
30 changed files with 30 additions and 30 deletions

View File

@@ -2,7 +2,7 @@
* @name Uncontrolled data used in path expression
* @description Accessing paths influenced by users can allow an attacker to access
* unexpected resources.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/path-injection

View File

@@ -2,7 +2,7 @@
* @name Uncontrolled command line
* @description Using externally controlled strings in a command line may allow a malicious
* user to change the meaning of the command.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/command-line-injection

View File

@@ -2,7 +2,7 @@
* @name Reflected cross-site scripting
* @description Writing user input directly to an HTTP response allows for
* a cross-site scripting vulnerability.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/reflected-xss

View File

@@ -2,7 +2,7 @@
* @name Stored cross-site scripting
* @description Using uncontrolled stored values in HTML allows for
* a stored cross-site scripting vulnerability.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/stored-xss

View File

@@ -2,7 +2,7 @@
* @name Client side cross-site scripting
* @description Writing user input directly to the DOM allows for
* a cross-site scripting vulnerability.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/xss

View File

@@ -2,7 +2,7 @@
* @name Database query built from user-controlled sources
* @description Building a database query from user-controlled sources is vulnerable to insertion of
* malicious code by the user.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/sql-injection

View File

@@ -2,7 +2,7 @@
* @name Code injection
* @description Interpreting unsanitized user input as code allows a malicious user arbitrary
* code execution.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/code-injection

View File

@@ -1,7 +1,7 @@
/**
* @name Use of externally-controlled format string
* @description Using external input in format strings can lead to garbled output.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision high
* @id js/tainted-format-string

View File

@@ -1,7 +1,7 @@
/**
* @name File data in outbound network request
* @description Directly sending file data in an outbound network request can indicate unauthorized information disclosure.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @id js/file-access-to-http
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Propagating stack trace information to an external user can
* unintentionally reveal implementation details that are useful
* to an attacker for developing a subsequent exploit.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision very-high
* @id js/stack-trace-exposure

View File

@@ -2,7 +2,7 @@
* @name Clear-text logging of sensitive information
* @description Logging sensitive information without encryption or hashing can
* expose it to an attacker.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/clear-text-logging

View File

@@ -2,7 +2,7 @@
* @name Clear text storage of sensitive information
* @description Sensitive information stored without encryption or hashing can expose it to an
* attacker.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/clear-text-storage-of-sensitive-data

View File

@@ -1,7 +1,7 @@
/**
* @name Use of a broken or weak cryptographic algorithm
* @description Using broken or weak cryptographic algorithms can compromise security.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision high
* @id js/weak-cryptographic-algorithm

View File

@@ -3,7 +3,7 @@
* @description Using a cryptographically weak pseudo-random number generator to generate a
* security-sensitive value may allow an attacker to predict what value will
* be generated.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision high
* @id js/insecure-randomness

View File

@@ -1,7 +1,7 @@
/**
* @name CORS misconfiguration for credentials transfer
* @description Misconfiguration of CORS HTTP headers allows for leaks of secret credentials.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/cors-misconfiguration-for-credentials

View File

@@ -3,7 +3,7 @@
* @description Allowing writes to arbitrary properties or calls to arbitrary
* methods of an object may lead to denial-of-service attacks.
*
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision medium
* @id js/remote-property-injection

View File

@@ -2,7 +2,7 @@
* @name Deserialization of user-controlled data
* @description Deserializing user-controlled data may allow attackers to
* execute arbitrary code.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision high
* @id js/unsafe-deserialization

View File

@@ -2,7 +2,7 @@
* @name Client-side URL redirect
* @description Client-side URL redirection based on unvalidated user input
* may cause redirection to malicious web sites.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/client-side-unvalidated-url-redirection

View File

@@ -2,7 +2,7 @@
* @name Server-side URL redirect
* @description Server-side URL redirection based on unvalidated user input
* may cause redirection to malicious web sites.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @id js/server-side-unvalidated-url-redirection
* @tags security

View File

@@ -2,7 +2,7 @@
* @name XML external entity expansion
* @description Parsing user input as an XML document with external
* entity expansion is vulnerable to XXE attacks.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/xxe

View File

@@ -2,7 +2,7 @@
* @name Host header poisoning in email generation
* @description Using the HTTP Host header to construct a link in an email can facilitate phishing
* attacks and leak password reset tokens.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/host-header-forgery-in-email-generation

View File

@@ -2,7 +2,7 @@
* @name XPath injection
* @description Building an XPath expression from user-controlled sources is vulnerable to insertion of
* malicious code by the user.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/xpath-injection

View File

@@ -3,7 +3,7 @@
* @description User input should not be used in regular expressions without first being escaped,
* otherwise a malicious user may be able to inject an expression that could require
* exponential time on certain inputs.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/regex-injection

View File

@@ -2,7 +2,7 @@
* @name XML internal entity expansion
* @description Parsing user input as an XML document with arbitrary internal
* entity expansion is vulnerable to denial-of-service attacks.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision high
* @id js/xml-bomb

View File

@@ -2,7 +2,7 @@
* @name Hard-coded credentials
* @description Hard-coding credentials in source code may enable an attacker
* to gain unauthorized access.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision high
* @id js/hardcoded-credentials

View File

@@ -1,7 +1,7 @@
/**
* @name User-controlled bypass of security check
* @description Conditions that the user controls are not suited for making security-related decisions.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision medium
* @id js/user-controlled-bypass

View File

@@ -1,7 +1,7 @@
/**
* @name Type confusion through parameter tampering
* @description Sanitizing an HTTP request parameter may be ineffective if the user controls its type.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision high
* @id js/type-confusion-through-parameter-tampering

View File

@@ -1,7 +1,7 @@
/**
* @name User-controlled data written to file
* @description Writing user-controlled data directly to the file system allows arbitrary file upload and might indicate a backdoor.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @id js/http-to-file-access
* @tags security

View File

@@ -1,7 +1,7 @@
/**
* @name Use of password hash with insufficient computational effort
* @description Creating a hash of a password with low computational effort makes the hash vulnerable to password cracking attacks.
* @kind problem
* @kind path-problem
* @problem.severity warning
* @precision high
* @id js/insufficient-password-hash

View File

@@ -1,7 +1,7 @@
/**
* @name Uncontrolled data used in network request
* @description Sending network requests with user-controlled data allows for request forgery attacks.
* @kind problem
* @kind path-problem
* @problem.severity error
* @precision medium
* @id js/request-forgery