JS: Update names, IDs, and tags for ML-powered queries

This commit is contained in:
Henry Mercer
2022-01-13 17:45:40 +00:00
parent 4ffd8c62ac
commit e9bb9f5294
4 changed files with 12 additions and 12 deletions

View File

@@ -1,15 +1,15 @@
/**
* For internal use only.
*
* @name NoSQL database query built from user-controlled sources (boosted)
* @name NoSQL database query built from user-controlled sources (experimental)
* @description Building a database query from user-controlled sources is vulnerable to insertion of
* malicious code by the user.
* @kind path-problem
* @scored
* @problem.severity error
* @security-severity 8.8
* @id adaptive-threat-modeling/js/nosql-injection
* @tags experimental experimental/atm security
* @id js/ml-powered/nosql-injection
* @tags experimental security
*/
import ATM::ResultsInfo

View File

@@ -1,15 +1,15 @@
/**
* For internal use only.
*
* @name SQL database query built from user-controlled sources (boosted)
* @name SQL database query built from user-controlled sources (experimental)
* @description Building a database query from user-controlled sources is vulnerable to insertion of
* malicious code by the user.
* @kind path-problem
* @scored
* @problem.severity error
* @security-severity 8.8
* @id adaptive-threat-modeling/js/sql-injection
* @tags experimental experimental/atm security
* @id js/ml-powered/sql-injection
* @tags experimental security
*/
import experimental.adaptivethreatmodeling.SqlInjectionATM

View File

@@ -1,15 +1,15 @@
/**
* For internal use only.
*
* @name Uncontrolled data used in path expression (boosted)
* @name Uncontrolled data used in path expression (experimental)
* @description Accessing paths influenced by users can allow an attacker to access
* unexpected resources.
* @kind path-problem
* @scored
* @problem.severity error
* @security-severity 7.5
* @id adaptive-threat-modeling/js/path-injection
* @tags experimental experimental/atm security
* @id js/ml-powered/path-injection
* @tags experimental security
*/
import ATM::ResultsInfo

View File

@@ -1,15 +1,15 @@
/**
* For internal use only.
*
* @name Client-side cross-site scripting (boosted)
* @name Client-side cross-site scripting (experimental)
* @description Writing user input directly to the DOM allows for
* a cross-site scripting vulnerability.
* @kind path-problem
* @scored
* @problem.severity error
* @security-severity 6.1
* @id adaptive-threat-modeling/js/xss
* @tags experimental experimental/atm security
* @id js/ml-powered/xss
* @tags experimental security
*/
import javascript