mirror of
https://github.com/github/codeql.git
synced 2026-03-21 23:16:53 +01:00
JavaScript: Make all taint-based security queries have @kind path-problem.
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
* @name Uncontrolled data used in path expression
|
||||
* @description Accessing paths influenced by users can allow an attacker to access
|
||||
* unexpected resources.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/path-injection
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Uncontrolled command line
|
||||
* @description Using externally controlled strings in a command line may allow a malicious
|
||||
* user to change the meaning of the command.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/command-line-injection
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Reflected cross-site scripting
|
||||
* @description Writing user input directly to an HTTP response allows for
|
||||
* a cross-site scripting vulnerability.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/reflected-xss
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Stored cross-site scripting
|
||||
* @description Using uncontrolled stored values in HTML allows for
|
||||
* a stored cross-site scripting vulnerability.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/stored-xss
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Client side cross-site scripting
|
||||
* @description Writing user input directly to the DOM allows for
|
||||
* a cross-site scripting vulnerability.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/xss
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Database query built from user-controlled sources
|
||||
* @description Building a database query from user-controlled sources is vulnerable to insertion of
|
||||
* malicious code by the user.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/sql-injection
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Code injection
|
||||
* @description Interpreting unsanitized user input as code allows a malicious user arbitrary
|
||||
* code execution.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/code-injection
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name Use of externally-controlled format string
|
||||
* @description Using external input in format strings can lead to garbled output.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @id js/tainted-format-string
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name File data in outbound network request
|
||||
* @description Directly sending file data in an outbound network request can indicate unauthorized information disclosure.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @id js/file-access-to-http
|
||||
* @tags security
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
* @description Propagating stack trace information to an external user can
|
||||
* unintentionally reveal implementation details that are useful
|
||||
* to an attacker for developing a subsequent exploit.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision very-high
|
||||
* @id js/stack-trace-exposure
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Clear-text logging of sensitive information
|
||||
* @description Logging sensitive information without encryption or hashing can
|
||||
* expose it to an attacker.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/clear-text-logging
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Clear text storage of sensitive information
|
||||
* @description Sensitive information stored without encryption or hashing can expose it to an
|
||||
* attacker.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/clear-text-storage-of-sensitive-data
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name Use of a broken or weak cryptographic algorithm
|
||||
* @description Using broken or weak cryptographic algorithms can compromise security.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @id js/weak-cryptographic-algorithm
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
* @description Using a cryptographically weak pseudo-random number generator to generate a
|
||||
* security-sensitive value may allow an attacker to predict what value will
|
||||
* be generated.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @id js/insecure-randomness
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name CORS misconfiguration for credentials transfer
|
||||
* @description Misconfiguration of CORS HTTP headers allows for leaks of secret credentials.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/cors-misconfiguration-for-credentials
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
* @description Allowing writes to arbitrary properties or calls to arbitrary
|
||||
* methods of an object may lead to denial-of-service attacks.
|
||||
*
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision medium
|
||||
* @id js/remote-property-injection
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Deserialization of user-controlled data
|
||||
* @description Deserializing user-controlled data may allow attackers to
|
||||
* execute arbitrary code.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @id js/unsafe-deserialization
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Client-side URL redirect
|
||||
* @description Client-side URL redirection based on unvalidated user input
|
||||
* may cause redirection to malicious web sites.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/client-side-unvalidated-url-redirection
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Server-side URL redirect
|
||||
* @description Server-side URL redirection based on unvalidated user input
|
||||
* may cause redirection to malicious web sites.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @id js/server-side-unvalidated-url-redirection
|
||||
* @tags security
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name XML external entity expansion
|
||||
* @description Parsing user input as an XML document with external
|
||||
* entity expansion is vulnerable to XXE attacks.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/xxe
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Host header poisoning in email generation
|
||||
* @description Using the HTTP Host header to construct a link in an email can facilitate phishing
|
||||
* attacks and leak password reset tokens.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/host-header-forgery-in-email-generation
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name XPath injection
|
||||
* @description Building an XPath expression from user-controlled sources is vulnerable to insertion of
|
||||
* malicious code by the user.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/xpath-injection
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
* @description User input should not be used in regular expressions without first being escaped,
|
||||
* otherwise a malicious user may be able to inject an expression that could require
|
||||
* exponential time on certain inputs.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/regex-injection
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name XML internal entity expansion
|
||||
* @description Parsing user input as an XML document with arbitrary internal
|
||||
* entity expansion is vulnerable to denial-of-service attacks.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @id js/xml-bomb
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
* @name Hard-coded credentials
|
||||
* @description Hard-coding credentials in source code may enable an attacker
|
||||
* to gain unauthorized access.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @id js/hardcoded-credentials
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name User-controlled bypass of security check
|
||||
* @description Conditions that the user controls are not suited for making security-related decisions.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision medium
|
||||
* @id js/user-controlled-bypass
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name Type confusion through parameter tampering
|
||||
* @description Sanitizing an HTTP request parameter may be ineffective if the user controls its type.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision high
|
||||
* @id js/type-confusion-through-parameter-tampering
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name User-controlled data written to file
|
||||
* @description Writing user-controlled data directly to the file system allows arbitrary file upload and might indicate a backdoor.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @id js/http-to-file-access
|
||||
* @tags security
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name Use of password hash with insufficient computational effort
|
||||
* @description Creating a hash of a password with low computational effort makes the hash vulnerable to password cracking attacks.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity warning
|
||||
* @precision high
|
||||
* @id js/insufficient-password-hash
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name Uncontrolled data used in network request
|
||||
* @description Sending network requests with user-controlled data allows for request forgery attacks.
|
||||
* @kind problem
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @precision medium
|
||||
* @id js/request-forgery
|
||||
|
||||
Reference in New Issue
Block a user