JS: Lower security-severity of queries with speculative threat model

In the CVSS calculator we model this by setting 'Attack Complexity' to
High and 'User Interaction' to Low (as opposed to None).

CVSS vector:
  CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N
This commit is contained in:
Asger Feldthaus
2021-10-05 08:11:57 +02:00
parent 4a16be2cba
commit 83ca4ef6d9
5 changed files with 5 additions and 5 deletions

View File

@@ -5,7 +5,7 @@
* command-line injection vulnerabilities.
* @kind path-problem
* @problem.severity warning
* @security-severity 9.8
* @security-severity 6.3
* @precision medium
* @id js/indirect-command-line-injection
* @tags correctness

View File

@@ -4,7 +4,7 @@
* environment may cause subtle bugs or vulnerabilities.
* @kind path-problem
* @problem.severity warning
* @security-severity 9.8
* @security-severity 6.3
* @precision high
* @id js/shell-command-injection-from-environment
* @tags correctness

View File

@@ -4,7 +4,7 @@
* user to change the meaning of the command.
* @kind path-problem
* @problem.severity error
* @security-severity 9.8
* @security-severity 6.3
* @precision high
* @id js/shell-command-constructed-from-input
* @tags correctness

View File

@@ -3,7 +3,7 @@
* @description Using the `cat` process to read a file is unnecessarily complex, inefficient, unportable, and can lead to subtle bugs, or even security vulnerabilities.
* @kind problem
* @problem.severity error
* @security-severity 9.8
* @security-severity 6.3
* @precision high
* @id js/unnecessary-use-of-cat
* @tags correctness

View File

@@ -3,7 +3,7 @@
* @description Writing network data directly to the file system allows arbitrary file upload and might indicate a backdoor.
* @kind path-problem
* @problem.severity warning
* @security-severity 9.8
* @security-severity 6.3
* @precision medium
* @id js/http-to-file-access
* @tags security