Skip to content

Commit

Permalink
SONARJAVA-4657 Update rules metadata (#4477)
Browse files Browse the repository at this point in the history
  • Loading branch information
alban-auzeill authored Oct 13, 2023
1 parent a7fa130 commit 476b93b
Show file tree
Hide file tree
Showing 28 changed files with 2,123 additions and 1,234 deletions.

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -101,6 +101,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#CUSTOM_MESSAGE_DIGEST"
},
{
"key": "DANGEROUS_PERMISSION_COMBINATION",
"name": "Dangerous combination of permissions granted",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#DANGEROUS_PERMISSION_COMBINATION"
},
{
"key": "DEFAULT_HTTP_CLIENT",
"name": "DefaultHttpClient with default constructor is not compatible with TLS 1.2",
Expand Down Expand Up @@ -131,6 +137,18 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#EL_INJECTION"
},
{
"key": "ENTITY_LEAK",
"name": "Unexpected property leak",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#ENTITY_LEAK"
},
{
"key": "ENTITY_MASS_ASSIGNMENT",
"name": "Mass assignment",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#ENTITY_MASS_ASSIGNMENT"
},
{
"key": "ESAPI_ENCRYPTOR",
"name": "Use of ESAPI Encryptor",
Expand All @@ -155,15 +173,21 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#FORMAT_STRING_MANIPULATION"
},
{
"key": "GROOVY_SHELL",
"name": "Potential code injection when using GroovyShell",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#GROOVY_SHELL"
},
{
"key": "HARD_CODE_KEY",
"name": "Hard Coded Key",
"name": "Hard coded key",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_KEY"
},
{
"key": "HARD_CODE_PASSWORD",
"name": "Hard Coded Password",
"name": "Hard coded password",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_PASSWORD"
},
Expand Down Expand Up @@ -191,6 +215,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#HTTP_RESPONSE_SPLITTING"
},
{
"key": "IMPROPER_UNICODE",
"name": "Improper handling of Unicode transformations",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#IMPROPER_UNICODE"
},
{
"key": "INFORMATION_EXPOSURE_THROUGH_AN_ERROR_MESSAGE",
"name": "Information Exposure Through An Error Message",
Expand Down Expand Up @@ -247,7 +277,7 @@
},
{
"key": "JSP_XSLT",
"name": "A malicious XSLT could be provided",
"name": "A malicious XSLT could be provided to the JSP tag",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#JSP_XSLT"
},
Expand Down Expand Up @@ -275,6 +305,18 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#MALICIOUS_XSLT"
},
{
"key": "MODIFICATION_AFTER_VALIDATION",
"name": "String is modified after validation and not before it",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#MODIFICATION_AFTER_VALIDATION"
},
{
"key": "NORMALIZATION_AFTER_VALIDATION",
"name": "String is normalzied after validation and not before it",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#NORMALIZATION_AFTER_VALIDATION"
},
{
"key": "NULL_CIPHER",
"name": "NullCipher is insecure",
Expand All @@ -293,6 +335,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#OGNL_INJECTION"
},
{
"key": "OVERLY_PERMISSIVE_FILE_PERMISSION",
"name": "Overly permissive file permission",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#OVERLY_PERMISSIVE_FILE_PERMISSION"
},
{
"key": "PADDING_ORACLE",
"name": "Cipher is susceptible to Padding Oracle",
Expand Down Expand Up @@ -347,6 +395,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#REQUESTDISPATCHER_FILE_DISCLOSURE"
},
{
"key": "RPC_ENABLED_EXTENSIONS",
"name": "Enabling extensions in Apache XML RPC server or client.",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#RPC_ENABLED_EXTENSIONS"
},
{
"key": "RSA_KEY_SIZE",
"name": "RSA usage with short key",
Expand All @@ -359,6 +413,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#RSA_NO_PADDING"
},
{
"key": "SAML_IGNORE_COMMENTS",
"name": "Ignoring XML comments in SAML may lead to authentication bypass",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#SAML_IGNORE_COMMENTS"
},
{
"key": "SCALA_COMMAND_INJECTION",
"name": "Potential Command Injection (Scala)",
Expand All @@ -367,7 +427,7 @@
},
{
"key": "SCALA_PATH_TRAVERSAL_IN",
"name": "Potential Path Traversal (file read)",
"name": "Potential Path Traversal using Scala API (file read)",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#SCALA_PATH_TRAVERSAL_IN"
},
Expand Down Expand Up @@ -557,6 +617,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_TURBINE"
},
{
"key": "SQL_INJECTION_VERTX",
"name": "Potential SQL Injection with Vert.x Sql Client",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_VERTX"
},
{
"key": "SSL_CONTEXT",
"name": "Weak SSLContext",
Expand Down Expand Up @@ -611,6 +677,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_FREEMARKER"
},
{
"key": "TEMPLATE_INJECTION_PEBBLE",
"name": "Potential template injection with Pebble",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_PEBBLE"
},
{
"key": "TEMPLATE_INJECTION_VELOCITY",
"name": "Potential template injection with Velocity",
Expand Down Expand Up @@ -695,6 +767,12 @@
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#WICKET_ENDPOINT"
},
{
"key": "WICKET_XSS1",
"name": "Disabling HTML escaping put the application at risk for XSS",
"type": "VULNERABILITY",
"url": "https://find-sec-bugs.github.io/bugs.htm#WICKET_XSS1"
},
{
"key": "XML_DECODER",
"name": "XMLDecoder usage",
Expand Down
Loading

0 comments on commit 476b93b

Please sign in to comment.