vrt 0.1 → 0.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/data/1.2/deprecated-node-mapping.json +50 -0
- data/lib/data/1.2/vrt.schema.json +62 -0
- data/lib/data/1.2/vulnerability-rating-taxonomy.json +1583 -0
- data/lib/vrt/version.rb +1 -1
- metadata +5 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 61f3553f98d0b502f458ee6566dc76e0c3237279
|
4
|
+
data.tar.gz: b7240f35e43cdb044982784b47490d90faf34f72
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 97b80beb9eed048a770dde54effefaf18ebc59404e3e14116b764a36fc674f52a72d7002c0d8c180aa02fc67e3a1d644d080836428f15df1af5509a9e2c84f95
|
7
|
+
data.tar.gz: 13211ce3cc7291c9890ec696dc40bc3b805e94946cda96f50a07f849261cff7bb55bc17e84f6023172f622ab8116ad52b43103e1e5290a43c9b37c6808fa59d2
|
@@ -0,0 +1,50 @@
|
|
1
|
+
{
|
2
|
+
"poor_physical_security": {
|
3
|
+
"1.1": "other"
|
4
|
+
},
|
5
|
+
"social_engineering": {
|
6
|
+
"1.1": "other"
|
7
|
+
},
|
8
|
+
"unvalidated_redirects_and_forwards.open_redirect.get_based_all_users": {
|
9
|
+
"1.2": "unvalidated_redirects_and_forwards.open_redirect.get_based"
|
10
|
+
},
|
11
|
+
"unvalidated_redirects_and_forwards.open_redirect.get_based_authenticated": {
|
12
|
+
"1.2": "unvalidated_redirects_and_forwards.open_redirect.get_based"
|
13
|
+
},
|
14
|
+
"unvalidated_redirects_and_forwards.open_redirect.get_based_unauthenticated": {
|
15
|
+
"1.2": "unvalidated_redirects_and_forwards.open_redirect.get_based"
|
16
|
+
},
|
17
|
+
"broken_authentication_and_session_management.session_token_in_url.over_https": {
|
18
|
+
"1.2": "sensitive_data_exposure.sensitive_token_in_url"
|
19
|
+
},
|
20
|
+
"broken_authentication_and_session_management.session_token_in_url.over_http": {
|
21
|
+
"1.2": "sensitive_data_exposure.sensitive_token_in_url"
|
22
|
+
},
|
23
|
+
"broken_authentication_and_session_management.session_token_in_url": {
|
24
|
+
"1.2": "sensitive_data_exposure.sensitive_token_in_url"
|
25
|
+
},
|
26
|
+
"insecure_data_transport": {
|
27
|
+
"1.2": "mobile_security_misconfiguration"
|
28
|
+
},
|
29
|
+
"insecure_data_transport.ssl_certificate_pinning": {
|
30
|
+
"1.2": "mobile_security_misconfiguration.ssl_certificate_pinning"
|
31
|
+
},
|
32
|
+
"insecure_data_transport.ssl_certificate_pinning.absent": {
|
33
|
+
"1.2": "mobile_security_misconfiguration.ssl_certificate_pinning.absent"
|
34
|
+
},
|
35
|
+
"insecure_data_transport.ssl_certificate_pinning.defeatable": {
|
36
|
+
"1.2": "mobile_security_misconfiguration.ssl_certificate_pinning.defeatable"
|
37
|
+
},
|
38
|
+
"insecure_data_storage.credentials_stored_unencrypted": {
|
39
|
+
"1.2": "insecure_data_storage.sensitive_application_data_stored_unencrypted"
|
40
|
+
},
|
41
|
+
"insecure_data_storage.credentials_stored_unencrypted.on_external_storage": {
|
42
|
+
"1.2": "insecure_data_storage.sensitive_application_data_stored_unencrypted.on_external_storage"
|
43
|
+
},
|
44
|
+
"insecure_data_storage.credentials_stored_unencrypted.on_internal_storage": {
|
45
|
+
"1.2": "insecure_data_storage.sensitive_application_data_stored_unencrypted.on_internal_storage"
|
46
|
+
},
|
47
|
+
"insufficient_security_configurability.weak_password_policy.complexity_both_length_and_char_type_not_enforced": {
|
48
|
+
"1.2": "insufficient_security_configurability.weak_password_policy.no_password_policy"
|
49
|
+
}
|
50
|
+
}
|
@@ -0,0 +1,62 @@
|
|
1
|
+
{
|
2
|
+
"$schema": "http://json-schema.org/draft-04/schema#",
|
3
|
+
"title": "Vulnerability Rating Taxonomy",
|
4
|
+
"description": "A Taxonomy of potential vulnerabilities with suggested technical priority rating",
|
5
|
+
"definitions": {
|
6
|
+
"VRTmetadata": {
|
7
|
+
"type": "object",
|
8
|
+
"properties": {
|
9
|
+
"release_date": { "type": "string", "format": "date-time" }
|
10
|
+
}
|
11
|
+
},
|
12
|
+
"VRT": {
|
13
|
+
"type": "object",
|
14
|
+
"properties": {
|
15
|
+
"id": { "type": "string", "pattern": "^[a-z_][a-z_0-9]*$" },
|
16
|
+
"type": { "type": "string", "enum": [ "category", "subcategory", "variant" ] },
|
17
|
+
"name": { "type": "string", "pattern": "^[ a-zA-Z0-9-+()\/,.<]*$" },
|
18
|
+
"priority": {
|
19
|
+
"anyOf": [
|
20
|
+
{ "type": "number", "minimum": 1, "maximum": 5 },
|
21
|
+
{ "type": "null" }
|
22
|
+
]
|
23
|
+
}
|
24
|
+
},
|
25
|
+
"required": ["id", "name", "type", "priority"]
|
26
|
+
},
|
27
|
+
"VRTparent": {
|
28
|
+
"type": "object",
|
29
|
+
"properties": {
|
30
|
+
"id": { "type": "string", "pattern": "^[a-z_][a-z_0-9]*$" },
|
31
|
+
"name": { "type": "string", "pattern": "^[ a-zA-Z0-9-+()\/,.<]*$" },
|
32
|
+
"type": { "type": "string", "enum": [ "category", "subcategory" ] },
|
33
|
+
"children": {
|
34
|
+
"type": "array",
|
35
|
+
"items" : {
|
36
|
+
"anyOf": [
|
37
|
+
{ "$ref": "#/definitions/VRTparent" },
|
38
|
+
{ "$ref": "#/definitions/VRT" }
|
39
|
+
]
|
40
|
+
}
|
41
|
+
}
|
42
|
+
},
|
43
|
+
"required": ["id", "name", "type", "children"]
|
44
|
+
}
|
45
|
+
},
|
46
|
+
"type": "object",
|
47
|
+
"required": ["metadata", "content"],
|
48
|
+
"properties": {
|
49
|
+
"metadata": {
|
50
|
+
"$ref": "#/definitions/VRTmetadata"
|
51
|
+
},
|
52
|
+
"content": {
|
53
|
+
"type": "array",
|
54
|
+
"items" : {
|
55
|
+
"anyOf": [
|
56
|
+
{ "$ref": "#/definitions/VRTparent" },
|
57
|
+
{ "$ref": "#/definitions/VRT" }
|
58
|
+
]
|
59
|
+
}
|
60
|
+
}
|
61
|
+
}
|
62
|
+
}
|