Merge pull request #20671 from github/napalys/adjust_query_severity

Adjust query severity ratings
This commit is contained in:
Napalys Klicius
2025-11-11 12:37:31 +01:00
committed by GitHub
10 changed files with 24 additions and 6 deletions

View File

@@ -4,7 +4,7 @@
* This may allow an attacker to bypass a filter or sanitizer. * This may allow an attacker to bypass a filter or sanitizer.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @security-severity 5.0 * @security-severity 4.0
* @precision high * @precision high
* @id java/overly-large-range * @id java/overly-large-range
* @tags correctness * @tags correctness

View File

@@ -4,7 +4,7 @@
* interception. * interception.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @security-severity 5.0 * @security-severity 4.0
* @precision high * @precision high
* @id java/insecure-cookie * @id java/insecure-cookie
* @tags security * @tags security

View File

@@ -0,0 +1,5 @@
---
category: queryMetadata
---
* Reduced the `security-severity` score of the `java/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.
* Reduced the `security-severity` score of the `java/insecure-cookie` query from 5.0 to 4.0 to better reflect its impact.

View File

@@ -4,7 +4,7 @@
* This may allow an attacker to bypass a filter or sanitizer. * This may allow an attacker to bypass a filter or sanitizer.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @security-severity 5.0 * @security-severity 4.0
* @precision high * @precision high
* @id js/overly-large-range * @id js/overly-large-range
* @tags correctness * @tags correctness

View File

@@ -4,7 +4,7 @@
* can lead to a cross-site scripting vulnerability. * can lead to a cross-site scripting vulnerability.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @security-severity 6.1 * @security-severity 7.8
* @precision high * @precision high
* @id js/xss-through-dom * @id js/xss-through-dom
* @tags security * @tags security

View File

@@ -0,0 +1,5 @@
---
category: queryMetadata
---
* Increased the `security-severity` score of the `js/xss-through-dom` query from 6.1 to 7.8 to align with other XSS queries.
* Reduced the `security-severity` score of the `js/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.

View File

@@ -4,7 +4,7 @@
* This may allow an attacker to bypass a filter or sanitizer. * This may allow an attacker to bypass a filter or sanitizer.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @security-severity 5.0 * @security-severity 4.0
* @precision high * @precision high
* @id py/overly-large-range * @id py/overly-large-range
* @tags correctness * @tags correctness

View File

@@ -0,0 +1,4 @@
---
category: queryMetadata
---
* Reduced the `security-severity` score of the `py/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.

View File

@@ -0,0 +1,4 @@
---
category: queryMetadata
---
* Reduced the `security-severity` score of the `rb/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.

View File

@@ -4,7 +4,7 @@
* This may allow an attacker to bypass a filter or sanitizer. * This may allow an attacker to bypass a filter or sanitizer.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @security-severity 5.0 * @security-severity 4.0
* @precision high * @precision high
* @id rb/overly-large-range * @id rb/overly-large-range
* @tags correctness * @tags correctness