@zerothreatai/vulnerability-registry 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.d.ts +8 -0
- package/dist/categories/authentication.js +375 -0
- package/dist/categories/configuration.d.ts +8 -0
- package/dist/categories/configuration.js +903 -0
- package/dist/categories/injection.d.ts +8 -0
- package/dist/categories/injection.js +747 -0
- package/dist/categories/sensitive-paths.d.ts +9 -0
- package/dist/categories/sensitive-paths.js +1788 -0
- package/dist/categories/ssrf.d.ts +8 -0
- package/dist/categories/ssrf.js +247 -0
- package/dist/categories/xss.d.ts +7 -0
- package/dist/categories/xss.js +325 -0
- package/dist/error-codes.d.ts +242 -0
- package/dist/error-codes.js +312 -0
- package/dist/index.d.ts +60 -0
- package/dist/index.js +92 -0
- package/dist/types.d.ts +86 -0
- package/dist/types.js +6 -0
- package/dist-cjs/categories/authentication.js +378 -0
- package/dist-cjs/categories/configuration.js +906 -0
- package/dist-cjs/categories/injection.js +750 -0
- package/dist-cjs/categories/sensitive-paths.js +1791 -0
- package/dist-cjs/categories/ssrf.js +250 -0
- package/dist-cjs/categories/xss.js +328 -0
- package/dist-cjs/error-codes.js +315 -0
- package/dist-cjs/index.js +107 -0
- package/dist-cjs/types.js +7 -0
- package/package.json +35 -0
- package/src/categories/authentication.d.ts +8 -0
- package/src/categories/authentication.d.ts.map +1 -0
- package/src/categories/authentication.js +378 -0
- package/src/categories/authentication.js.map +1 -0
- package/src/categories/authentication.ts +395 -0
- package/src/categories/configuration.d.ts +8 -0
- package/src/categories/configuration.d.ts.map +1 -0
- package/src/categories/configuration.js +906 -0
- package/src/categories/configuration.js.map +1 -0
- package/src/categories/configuration.ts +948 -0
- package/src/categories/injection.d.ts +8 -0
- package/src/categories/injection.d.ts.map +1 -0
- package/src/categories/injection.js +750 -0
- package/src/categories/injection.js.map +1 -0
- package/src/categories/injection.ts +785 -0
- package/src/categories/sensitive-paths.d.ts +9 -0
- package/src/categories/sensitive-paths.d.ts.map +1 -0
- package/src/categories/sensitive-paths.js +1791 -0
- package/src/categories/sensitive-paths.js.map +1 -0
- package/src/categories/sensitive-paths.ts +1875 -0
- package/src/categories/ssrf.d.ts +8 -0
- package/src/categories/ssrf.d.ts.map +1 -0
- package/src/categories/ssrf.js +250 -0
- package/src/categories/ssrf.js.map +1 -0
- package/src/categories/ssrf.ts +261 -0
- package/src/categories/xss.d.ts +7 -0
- package/src/categories/xss.d.ts.map +1 -0
- package/src/categories/xss.js +328 -0
- package/src/categories/xss.js.map +1 -0
- package/src/categories/xss.ts +342 -0
- package/src/error-codes.d.ts +242 -0
- package/src/error-codes.d.ts.map +1 -0
- package/src/error-codes.js +315 -0
- package/src/error-codes.js.map +1 -0
- package/src/error-codes.ts +334 -0
- package/src/index.d.ts +60 -0
- package/src/index.d.ts.map +1 -0
- package/src/index.js +107 -0
- package/src/index.js.map +1 -0
- package/src/index.ts +126 -0
- package/src/types.d.ts +86 -0
- package/src/types.d.ts.map +1 -0
- package/src/types.js +7 -0
- package/src/types.js.map +1 -0
- package/src/types.ts +109 -0
- package/tsconfig.cjs.json +8 -0
- package/tsconfig.json +21 -0
- package/vulnerability-registry.zip +0 -0
|
@@ -0,0 +1,315 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Vulnerability Registry - Error Codes
|
|
4
|
+
*
|
|
5
|
+
* Central enum containing all vulnerability error codes across all scanners.
|
|
6
|
+
* Each code maps to a complete VulnerabilityDefinition.
|
|
7
|
+
*/
|
|
8
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
+
exports.VulnerabilityCode = void 0;
|
|
10
|
+
var VulnerabilityCode;
|
|
11
|
+
(function (VulnerabilityCode) {
|
|
12
|
+
// ========================================
|
|
13
|
+
// SQL INJECTION (SQLI_*)
|
|
14
|
+
// ========================================
|
|
15
|
+
VulnerabilityCode["SQLI_ERROR_BASED"] = "SQLI_ERROR_BASED";
|
|
16
|
+
VulnerabilityCode["SQLI_BOOLEAN_BASED"] = "SQLI_BOOLEAN_BASED";
|
|
17
|
+
VulnerabilityCode["SQLI_TIME_BASED"] = "SQLI_TIME_BASED";
|
|
18
|
+
VulnerabilityCode["SQLI_STACK_BASED"] = "SQLI_STACK_BASED";
|
|
19
|
+
VulnerabilityCode["SQLI_UNION_BASED"] = "SQLI_UNION_BASED";
|
|
20
|
+
// ========================================
|
|
21
|
+
// CROSS-SITE SCRIPTING (XSS_*)
|
|
22
|
+
// ========================================
|
|
23
|
+
VulnerabilityCode["XSS_REFLECTED"] = "XSS_REFLECTED";
|
|
24
|
+
VulnerabilityCode["XSS_STORED"] = "XSS_STORED";
|
|
25
|
+
VulnerabilityCode["XSS_DOM_BASED"] = "XSS_DOM_BASED";
|
|
26
|
+
VulnerabilityCode["XSS_SVG_INJECTION"] = "XSS_SVG_INJECTION";
|
|
27
|
+
VulnerabilityCode["XSS_CSTI_ANGULAR"] = "XSS_CSTI_ANGULAR";
|
|
28
|
+
VulnerabilityCode["XSS_CSTI_VUE"] = "XSS_CSTI_VUE";
|
|
29
|
+
VulnerabilityCode["XSS_EVENT_HANDLER"] = "XSS_EVENT_HANDLER";
|
|
30
|
+
VulnerabilityCode["XSS_SCRIPT_INJECTION"] = "XSS_SCRIPT_INJECTION";
|
|
31
|
+
VulnerabilityCode["XSS_HTML_INJECTION"] = "XSS_HTML_INJECTION";
|
|
32
|
+
VulnerabilityCode["XSS_ATTRIBUTE_INJECTION"] = "XSS_ATTRIBUTE_INJECTION";
|
|
33
|
+
VulnerabilityCode["XSS_JS_CONTEXT"] = "XSS_JS_CONTEXT";
|
|
34
|
+
VulnerabilityCode["XSS_CSS_INJECTION"] = "XSS_CSS_INJECTION";
|
|
35
|
+
VulnerabilityCode["XSS_CSP_BYPASS"] = "XSS_CSP_BYPASS";
|
|
36
|
+
VulnerabilityCode["XSS_TEMPLATE_LITERAL"] = "XSS_TEMPLATE_LITERAL";
|
|
37
|
+
VulnerabilityCode["XSS_MUTATION_BASED"] = "XSS_MUTATION_BASED";
|
|
38
|
+
// ========================================
|
|
39
|
+
// COMMAND INJECTION (CMDI_*)
|
|
40
|
+
// ========================================
|
|
41
|
+
VulnerabilityCode["CMDI_OOB_CONFIRMED"] = "CMDI_OOB_CONFIRMED";
|
|
42
|
+
VulnerabilityCode["CMDI_REFLECTED"] = "CMDI_REFLECTED";
|
|
43
|
+
VulnerabilityCode["CMDI_TIME_BASED"] = "CMDI_TIME_BASED";
|
|
44
|
+
VulnerabilityCode["CMDI_ERROR_BASED"] = "CMDI_ERROR_BASED";
|
|
45
|
+
// ========================================
|
|
46
|
+
// SERVER-SIDE REQUEST FORGERY (SSRF_*)
|
|
47
|
+
// ========================================
|
|
48
|
+
VulnerabilityCode["SSRF_CLOUD_METADATA"] = "SSRF_CLOUD_METADATA";
|
|
49
|
+
VulnerabilityCode["SSRF_INTERNAL_SERVICE"] = "SSRF_INTERNAL_SERVICE";
|
|
50
|
+
VulnerabilityCode["SSRF_PROTOCOL_SMUGGLING"] = "SSRF_PROTOCOL_SMUGGLING";
|
|
51
|
+
VulnerabilityCode["SSRF_BLIND_OOB"] = "SSRF_BLIND_OOB";
|
|
52
|
+
VulnerabilityCode["SSRF_FILTER_BYPASS"] = "SSRF_FILTER_BYPASS";
|
|
53
|
+
// ========================================
|
|
54
|
+
// SERVER-SIDE TEMPLATE INJECTION (SSTI_*)
|
|
55
|
+
// ========================================
|
|
56
|
+
VulnerabilityCode["SSTI_JINJA2"] = "SSTI_JINJA2";
|
|
57
|
+
VulnerabilityCode["SSTI_TWIG"] = "SSTI_TWIG";
|
|
58
|
+
VulnerabilityCode["SSTI_FREEMARKER"] = "SSTI_FREEMARKER";
|
|
59
|
+
VulnerabilityCode["SSTI_VELOCITY"] = "SSTI_VELOCITY";
|
|
60
|
+
VulnerabilityCode["SSTI_THYMELEAF"] = "SSTI_THYMELEAF";
|
|
61
|
+
VulnerabilityCode["SSTI_ERB"] = "SSTI_ERB";
|
|
62
|
+
VulnerabilityCode["SSTI_EJS"] = "SSTI_EJS";
|
|
63
|
+
VulnerabilityCode["SSTI_PUG"] = "SSTI_PUG";
|
|
64
|
+
VulnerabilityCode["SSTI_SMARTY"] = "SSTI_SMARTY";
|
|
65
|
+
VulnerabilityCode["SSTI_MAKO"] = "SSTI_MAKO";
|
|
66
|
+
VulnerabilityCode["SSTI_GENERIC"] = "SSTI_GENERIC";
|
|
67
|
+
// ========================================
|
|
68
|
+
// XML EXTERNAL ENTITY (XXE_*)
|
|
69
|
+
// ========================================
|
|
70
|
+
VulnerabilityCode["XXE_CLASSIC"] = "XXE_CLASSIC";
|
|
71
|
+
VulnerabilityCode["XXE_BLIND"] = "XXE_BLIND";
|
|
72
|
+
VulnerabilityCode["XXE_OOB"] = "XXE_OOB";
|
|
73
|
+
VulnerabilityCode["XXE_ERROR_BASED"] = "XXE_ERROR_BASED";
|
|
74
|
+
VulnerabilityCode["XXE_PARAMETER_ENTITY"] = "XXE_PARAMETER_ENTITY";
|
|
75
|
+
// ========================================
|
|
76
|
+
// XPATH INJECTION (XPATH_*)
|
|
77
|
+
// ========================================
|
|
78
|
+
VulnerabilityCode["XPATH_AUTH_BYPASS"] = "XPATH_AUTH_BYPASS";
|
|
79
|
+
VulnerabilityCode["XPATH_DATA_EXTRACTION"] = "XPATH_DATA_EXTRACTION";
|
|
80
|
+
VulnerabilityCode["XPATH_BLIND"] = "XPATH_BLIND";
|
|
81
|
+
VulnerabilityCode["XPATH_ERROR_BASED"] = "XPATH_ERROR_BASED";
|
|
82
|
+
// ========================================
|
|
83
|
+
// LOCAL FILE INCLUSION (LFI_*)
|
|
84
|
+
// ========================================
|
|
85
|
+
VulnerabilityCode["LFI_PATH_TRAVERSAL"] = "LFI_PATH_TRAVERSAL";
|
|
86
|
+
VulnerabilityCode["LFI_FILTER_BYPASS"] = "LFI_FILTER_BYPASS";
|
|
87
|
+
VulnerabilityCode["LFI_SOURCE_DISCLOSURE"] = "LFI_SOURCE_DISCLOSURE";
|
|
88
|
+
VulnerabilityCode["LFI_WRAPPER_PROTOCOL"] = "LFI_WRAPPER_PROTOCOL";
|
|
89
|
+
VulnerabilityCode["LFI_PROC_DISCLOSURE"] = "LFI_PROC_DISCLOSURE";
|
|
90
|
+
// ========================================
|
|
91
|
+
// JWT VULNERABILITIES (JWT_*)
|
|
92
|
+
// ========================================
|
|
93
|
+
VulnerabilityCode["JWT_NONE_ALGORITHM"] = "JWT_NONE_ALGORITHM";
|
|
94
|
+
VulnerabilityCode["JWT_WEAK_SECRET"] = "JWT_WEAK_SECRET";
|
|
95
|
+
VulnerabilityCode["JWT_KEY_CONFUSION"] = "JWT_KEY_CONFUSION";
|
|
96
|
+
VulnerabilityCode["JWT_EXPIRED_TOKEN"] = "JWT_EXPIRED_TOKEN";
|
|
97
|
+
VulnerabilityCode["JWT_MISSING_CLAIMS"] = "JWT_MISSING_CLAIMS";
|
|
98
|
+
VulnerabilityCode["JWT_CLAIM_TAMPERING"] = "JWT_CLAIM_TAMPERING";
|
|
99
|
+
VulnerabilityCode["JWT_KID_INJECTION"] = "JWT_KID_INJECTION";
|
|
100
|
+
VulnerabilityCode["JWT_JKU_INJECTION"] = "JWT_JKU_INJECTION";
|
|
101
|
+
VulnerabilityCode["JWT_EMBEDDED_JWK"] = "JWT_EMBEDDED_JWK";
|
|
102
|
+
VulnerabilityCode["JWT_X5C_INJECTION"] = "JWT_X5C_INJECTION";
|
|
103
|
+
// ========================================
|
|
104
|
+
// OPEN REDIRECT (REDIRECT_*)
|
|
105
|
+
// ========================================
|
|
106
|
+
VulnerabilityCode["REDIRECT_HEADER_INJECTION"] = "REDIRECT_HEADER_INJECTION";
|
|
107
|
+
VulnerabilityCode["REDIRECT_META_REFRESH"] = "REDIRECT_META_REFRESH";
|
|
108
|
+
VulnerabilityCode["REDIRECT_JS_NAVIGATION"] = "REDIRECT_JS_NAVIGATION";
|
|
109
|
+
// ========================================
|
|
110
|
+
// BROKEN ACCESS CONTROL (BAC_*)
|
|
111
|
+
// ========================================
|
|
112
|
+
VulnerabilityCode["BAC_ANONYMOUS_ACCESS"] = "BAC_ANONYMOUS_ACCESS";
|
|
113
|
+
VulnerabilityCode["BAC_HORIZONTAL_PRIVILEGE"] = "BAC_HORIZONTAL_PRIVILEGE";
|
|
114
|
+
VulnerabilityCode["BAC_VERTICAL_PRIVILEGE"] = "BAC_VERTICAL_PRIVILEGE";
|
|
115
|
+
VulnerabilityCode["BAC_IDOR"] = "BAC_IDOR";
|
|
116
|
+
// ========================================
|
|
117
|
+
// SECURITY HEADERS (HEADER_*)
|
|
118
|
+
// ========================================
|
|
119
|
+
VulnerabilityCode["HEADER_MISSING_CSP"] = "HEADER_MISSING_CSP";
|
|
120
|
+
VulnerabilityCode["HEADER_MISSING_HSTS"] = "HEADER_MISSING_HSTS";
|
|
121
|
+
VulnerabilityCode["HEADER_MISSING_XFRAME"] = "HEADER_MISSING_XFRAME";
|
|
122
|
+
VulnerabilityCode["HEADER_MISSING_XCONTENT_TYPE"] = "HEADER_MISSING_XCONTENT_TYPE";
|
|
123
|
+
VulnerabilityCode["HEADER_MISSING_XSS_PROTECTION"] = "HEADER_MISSING_XSS_PROTECTION";
|
|
124
|
+
VulnerabilityCode["HEADER_MISSING_REFERRER_POLICY"] = "HEADER_MISSING_REFERRER_POLICY";
|
|
125
|
+
VulnerabilityCode["HEADER_MISSING_PERMISSIONS_POLICY"] = "HEADER_MISSING_PERMISSIONS_POLICY";
|
|
126
|
+
VulnerabilityCode["HEADER_WEAK_CSP"] = "HEADER_WEAK_CSP";
|
|
127
|
+
VulnerabilityCode["HEADER_CORS_MISCONFIGURED"] = "HEADER_CORS_MISCONFIGURED";
|
|
128
|
+
VulnerabilityCode["HEADER_COEP_WITHOUT_COOP"] = "HEADER_COEP_WITHOUT_COOP";
|
|
129
|
+
VulnerabilityCode["HEADER_CORP_UNUSUAL"] = "HEADER_CORP_UNUSUAL";
|
|
130
|
+
VulnerabilityCode["HEADER_EXPECT_CT_PRESENT"] = "HEADER_EXPECT_CT_PRESENT";
|
|
131
|
+
VulnerabilityCode["HEADER_SERVER_HEADER_PRESENT"] = "HEADER_SERVER_HEADER_PRESENT";
|
|
132
|
+
VulnerabilityCode["HEADER_X_POWERED_BY_PRESENT"] = "HEADER_X_POWERED_BY_PRESENT";
|
|
133
|
+
VulnerabilityCode["HEADER_X_XSS_PROTECTION_ENABLED"] = "HEADER_X_XSS_PROTECTION_ENABLED";
|
|
134
|
+
VulnerabilityCode["COOKIE_SAMESITE_NONE_WITHOUT_SECURE"] = "COOKIE_SAMESITE_NONE_WITHOUT_SECURE";
|
|
135
|
+
VulnerabilityCode["COOKIE_SESSION_MISSING_SECURE"] = "COOKIE_SESSION_MISSING_SECURE";
|
|
136
|
+
VulnerabilityCode["COOKIE_MISSING_SECURE"] = "COOKIE_MISSING_SECURE";
|
|
137
|
+
VulnerabilityCode["COOKIE_SESSION_MISSING_HTTPONLY"] = "COOKIE_SESSION_MISSING_HTTPONLY";
|
|
138
|
+
VulnerabilityCode["COOKIE_MISSING_HTTPONLY"] = "COOKIE_MISSING_HTTPONLY";
|
|
139
|
+
VulnerabilityCode["COOKIE_MISSING_SAMESITE"] = "COOKIE_MISSING_SAMESITE";
|
|
140
|
+
VulnerabilityCode["COOKIE_HOST_PREFIX_INVALID"] = "COOKIE_HOST_PREFIX_INVALID";
|
|
141
|
+
VulnerabilityCode["COOKIE_SECURE_PREFIX_INVALID"] = "COOKIE_SECURE_PREFIX_INVALID";
|
|
142
|
+
VulnerabilityCode["HEADER_DRIFT_CSP"] = "HEADER_DRIFT_CSP";
|
|
143
|
+
VulnerabilityCode["HEADER_DRIFT_HSTS"] = "HEADER_DRIFT_HSTS";
|
|
144
|
+
VulnerabilityCode["HEADER_DRIFT_XCONTENT_TYPE"] = "HEADER_DRIFT_XCONTENT_TYPE";
|
|
145
|
+
VulnerabilityCode["HEADER_DRIFT_REFERRER_POLICY"] = "HEADER_DRIFT_REFERRER_POLICY";
|
|
146
|
+
VulnerabilityCode["HEADER_DRIFT_XFRAME"] = "HEADER_DRIFT_XFRAME";
|
|
147
|
+
VulnerabilityCode["HEADER_DRIFT_PERMISSIONS_POLICY"] = "HEADER_DRIFT_PERMISSIONS_POLICY";
|
|
148
|
+
VulnerabilityCode["HEADER_DRIFT_COOP"] = "HEADER_DRIFT_COOP";
|
|
149
|
+
VulnerabilityCode["HEADER_DRIFT_COEP"] = "HEADER_DRIFT_COEP";
|
|
150
|
+
VulnerabilityCode["HEADER_DRIFT_CORP"] = "HEADER_DRIFT_CORP";
|
|
151
|
+
// ========================================
|
|
152
|
+
// HOST HEADER INJECTION (HOST_*)
|
|
153
|
+
// ========================================
|
|
154
|
+
VulnerabilityCode["HOST_CACHE_POISONING"] = "HOST_CACHE_POISONING";
|
|
155
|
+
VulnerabilityCode["HOST_PASSWORD_RESET"] = "HOST_PASSWORD_RESET";
|
|
156
|
+
VulnerabilityCode["HOST_REDIRECT"] = "HOST_REDIRECT";
|
|
157
|
+
// ========================================
|
|
158
|
+
// DIRECTORY BROWSING (DIRBROWSE_*)
|
|
159
|
+
// ========================================
|
|
160
|
+
VulnerabilityCode["DIRBROWSE_ENABLED"] = "DIRBROWSE_ENABLED";
|
|
161
|
+
VulnerabilityCode["DIRBROWSE_SENSITIVE"] = "DIRBROWSE_SENSITIVE";
|
|
162
|
+
// ========================================
|
|
163
|
+
// MASS ASSIGNMENT (MASSASSIGN_*)
|
|
164
|
+
// ========================================
|
|
165
|
+
VulnerabilityCode["MASSASSIGN_PROTOTYPE_POLLUTION"] = "MASSASSIGN_PROTOTYPE_POLLUTION";
|
|
166
|
+
VulnerabilityCode["MASSASSIGN_ROLE_ESCALATION"] = "MASSASSIGN_ROLE_ESCALATION";
|
|
167
|
+
VulnerabilityCode["MASSASSIGN_HIDDEN_FIELD"] = "MASSASSIGN_HIDDEN_FIELD";
|
|
168
|
+
// ========================================
|
|
169
|
+
// DESERIALIZATION (DESER_*)
|
|
170
|
+
// ========================================
|
|
171
|
+
VulnerabilityCode["DESER_JAVA"] = "DESER_JAVA";
|
|
172
|
+
VulnerabilityCode["DESER_PHP"] = "DESER_PHP";
|
|
173
|
+
VulnerabilityCode["DESER_PYTHON"] = "DESER_PYTHON";
|
|
174
|
+
VulnerabilityCode["DESER_DOTNET"] = "DESER_DOTNET";
|
|
175
|
+
VulnerabilityCode["DESER_RUBY"] = "DESER_RUBY";
|
|
176
|
+
VulnerabilityCode["DESER_NODE"] = "DESER_NODE";
|
|
177
|
+
// ========================================
|
|
178
|
+
// SENSITIVE PATH SCOUT - CRITICAL (SENS_CRIT_*)
|
|
179
|
+
// ========================================
|
|
180
|
+
VulnerabilityCode["SENS_CRIT_AWS_CREDENTIALS"] = "SENS_CRIT_AWS_CREDENTIALS";
|
|
181
|
+
VulnerabilityCode["SENS_CRIT_SSH_PRIVATE_KEY"] = "SENS_CRIT_SSH_PRIVATE_KEY";
|
|
182
|
+
VulnerabilityCode["SENS_CRIT_SSL_PRIVATE_KEY"] = "SENS_CRIT_SSL_PRIVATE_KEY";
|
|
183
|
+
VulnerabilityCode["SENS_CRIT_RAILS_MASTER_KEY"] = "SENS_CRIT_RAILS_MASTER_KEY";
|
|
184
|
+
VulnerabilityCode["SENS_CRIT_TERRAFORM_STATE"] = "SENS_CRIT_TERRAFORM_STATE";
|
|
185
|
+
VulnerabilityCode["SENS_CRIT_FIREBASE_ADMIN_SDK"] = "SENS_CRIT_FIREBASE_ADMIN_SDK";
|
|
186
|
+
VulnerabilityCode["SENS_CRIT_KUBE_CONFIG"] = "SENS_CRIT_KUBE_CONFIG";
|
|
187
|
+
VulnerabilityCode["SENS_CRIT_AZURE_STORAGE_KEY"] = "SENS_CRIT_AZURE_STORAGE_KEY";
|
|
188
|
+
VulnerabilityCode["SENS_CRIT_CONSUL_KV"] = "SENS_CRIT_CONSUL_KV";
|
|
189
|
+
VulnerabilityCode["SENS_CRIT_VAULT_SECRET"] = "SENS_CRIT_VAULT_SECRET";
|
|
190
|
+
VulnerabilityCode["SENS_CRIT_DOCKER_SECRET"] = "SENS_CRIT_DOCKER_SECRET";
|
|
191
|
+
// ========================================
|
|
192
|
+
// SENSITIVE PATH SCOUT - HIGH (SENS_HIGH_*)
|
|
193
|
+
// ========================================
|
|
194
|
+
VulnerabilityCode["SENS_HIGH_GIT_EXPOSED"] = "SENS_HIGH_GIT_EXPOSED";
|
|
195
|
+
VulnerabilityCode["SENS_HIGH_GIT_CONFIG"] = "SENS_HIGH_GIT_CONFIG";
|
|
196
|
+
VulnerabilityCode["SENS_HIGH_WORDPRESS_CONFIG"] = "SENS_HIGH_WORDPRESS_CONFIG";
|
|
197
|
+
VulnerabilityCode["SENS_HIGH_SPRING_ACTUATOR"] = "SENS_HIGH_SPRING_ACTUATOR";
|
|
198
|
+
VulnerabilityCode["SENS_HIGH_SPRING_HEAPDUMP"] = "SENS_HIGH_SPRING_HEAPDUMP";
|
|
199
|
+
VulnerabilityCode["SENS_HIGH_DATABASE_BACKUP"] = "SENS_HIGH_DATABASE_BACKUP";
|
|
200
|
+
VulnerabilityCode["SENS_HIGH_PHPINFO"] = "SENS_HIGH_PHPINFO";
|
|
201
|
+
VulnerabilityCode["SENS_HIGH_LARAVEL_DEBUG"] = "SENS_HIGH_LARAVEL_DEBUG";
|
|
202
|
+
VulnerabilityCode["SENS_HIGH_GCP_SERVICE_ACCOUNT"] = "SENS_HIGH_GCP_SERVICE_ACCOUNT";
|
|
203
|
+
VulnerabilityCode["SENS_HIGH_GRAPHQL_INTROSPECTION"] = "SENS_HIGH_GRAPHQL_INTROSPECTION";
|
|
204
|
+
VulnerabilityCode["SENS_HIGH_PHPMYADMIN"] = "SENS_HIGH_PHPMYADMIN";
|
|
205
|
+
VulnerabilityCode["SENS_HIGH_MONGODB_CONFIG"] = "SENS_HIGH_MONGODB_CONFIG";
|
|
206
|
+
VulnerabilityCode["SENS_HIGH_JAVA_KEYSTORE"] = "SENS_HIGH_JAVA_KEYSTORE";
|
|
207
|
+
VulnerabilityCode["SENS_HIGH_PHP_SESSION"] = "SENS_HIGH_PHP_SESSION";
|
|
208
|
+
VulnerabilityCode["SENS_HIGH_ENV_FILE"] = "SENS_HIGH_ENV_FILE";
|
|
209
|
+
VulnerabilityCode["SENS_HIGH_BACKUP_FILE"] = "SENS_HIGH_BACKUP_FILE";
|
|
210
|
+
VulnerabilityCode["SENS_HIGH_HTPASSWD"] = "SENS_HIGH_HTPASSWD";
|
|
211
|
+
VulnerabilityCode["SENS_HIGH_DS_STORE"] = "SENS_HIGH_DS_STORE";
|
|
212
|
+
// ========================================
|
|
213
|
+
// SENSITIVE PATH SCOUT - MEDIUM (SENS_MED_*)
|
|
214
|
+
// ========================================
|
|
215
|
+
VulnerabilityCode["SENS_MED_SWAGGER_DOCS"] = "SENS_MED_SWAGGER_DOCS";
|
|
216
|
+
VulnerabilityCode["SENS_MED_APACHE_STATUS"] = "SENS_MED_APACHE_STATUS";
|
|
217
|
+
VulnerabilityCode["SENS_MED_PROMETHEUS_METRICS"] = "SENS_MED_PROMETHEUS_METRICS";
|
|
218
|
+
VulnerabilityCode["SENS_MED_DOCKERFILE"] = "SENS_MED_DOCKERFILE";
|
|
219
|
+
VulnerabilityCode["SENS_MED_FIREBASE_CONFIG"] = "SENS_MED_FIREBASE_CONFIG";
|
|
220
|
+
VulnerabilityCode["SENS_MED_SOURCE_MAP"] = "SENS_MED_SOURCE_MAP";
|
|
221
|
+
VulnerabilityCode["SENS_MED_ELASTICSEARCH"] = "SENS_MED_ELASTICSEARCH";
|
|
222
|
+
VulnerabilityCode["SENS_MED_ADMIN_PANEL"] = "SENS_MED_ADMIN_PANEL";
|
|
223
|
+
VulnerabilityCode["SENS_MED_COMPOSER_LOCK"] = "SENS_MED_COMPOSER_LOCK";
|
|
224
|
+
VulnerabilityCode["SENS_MED_PACKAGE_LOCK"] = "SENS_MED_PACKAGE_LOCK";
|
|
225
|
+
VulnerabilityCode["SENS_MED_GEMFILE_LOCK"] = "SENS_MED_GEMFILE_LOCK";
|
|
226
|
+
VulnerabilityCode["SENS_MED_ROBOTS_TXT"] = "SENS_MED_ROBOTS_TXT";
|
|
227
|
+
VulnerabilityCode["SENS_MED_SITEMAP"] = "SENS_MED_SITEMAP";
|
|
228
|
+
VulnerabilityCode["SENS_MED_CROSSDOMAIN_XML"] = "SENS_MED_CROSSDOMAIN_XML";
|
|
229
|
+
// ========================================
|
|
230
|
+
// SENSITIVE PATH SCOUT - LOW (SENS_LOW_*)
|
|
231
|
+
// ========================================
|
|
232
|
+
VulnerabilityCode["SENS_LOW_TRAVIS_CI"] = "SENS_LOW_TRAVIS_CI";
|
|
233
|
+
VulnerabilityCode["SENS_LOW_JENKINSFILE"] = "SENS_LOW_JENKINSFILE";
|
|
234
|
+
VulnerabilityCode["SENS_LOW_CIRCLECI"] = "SENS_LOW_CIRCLECI";
|
|
235
|
+
VulnerabilityCode["SENS_LOW_GITLAB_CI"] = "SENS_LOW_GITLAB_CI";
|
|
236
|
+
VulnerabilityCode["SENS_LOW_README"] = "SENS_LOW_README";
|
|
237
|
+
VulnerabilityCode["SENS_LOW_CHANGELOG"] = "SENS_LOW_CHANGELOG";
|
|
238
|
+
VulnerabilityCode["SENS_LOW_LICENSE"] = "SENS_LOW_LICENSE";
|
|
239
|
+
// ========================================
|
|
240
|
+
// SENSITIVE PATH SCOUT - EXTENDED
|
|
241
|
+
// ========================================
|
|
242
|
+
// HIGH
|
|
243
|
+
VulnerabilityCode["SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED"] = "SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED";
|
|
244
|
+
VulnerabilityCode["SENS_HIGH_APPSETTINGS_JSON_EXPOSED"] = "SENS_HIGH_APPSETTINGS_JSON_EXPOSED";
|
|
245
|
+
VulnerabilityCode["SENS_HIGH_SPRING_CONFIG_EXPOSED"] = "SENS_HIGH_SPRING_CONFIG_EXPOSED";
|
|
246
|
+
VulnerabilityCode["SENS_HIGH_NPMRC_EXPOSED"] = "SENS_HIGH_NPMRC_EXPOSED";
|
|
247
|
+
VulnerabilityCode["SENS_HIGH_RAILS_DATABASE_YML_EXPOSED"] = "SENS_HIGH_RAILS_DATABASE_YML_EXPOSED";
|
|
248
|
+
VulnerabilityCode["SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED"] = "SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED";
|
|
249
|
+
VulnerabilityCode["SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED"] = "SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED";
|
|
250
|
+
VulnerabilityCode["SENS_HIGH_JOLOKIA_EXPOSED"] = "SENS_HIGH_JOLOKIA_EXPOSED";
|
|
251
|
+
VulnerabilityCode["SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED"] = "SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED";
|
|
252
|
+
VulnerabilityCode["SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED"] = "SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED";
|
|
253
|
+
VulnerabilityCode["SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED"] = "SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED";
|
|
254
|
+
VulnerabilityCode["SENS_HIGH_REDIS_RDB_DUMP_DETECTED"] = "SENS_HIGH_REDIS_RDB_DUMP_DETECTED";
|
|
255
|
+
VulnerabilityCode["SENS_HIGH_TRACE_AXD"] = "SENS_HIGH_TRACE_AXD";
|
|
256
|
+
VulnerabilityCode["SENS_HIGH_ELMAH_AXD_EXPOSED"] = "SENS_HIGH_ELMAH_AXD_EXPOSED";
|
|
257
|
+
VulnerabilityCode["SENS_HIGH_SQLITE_DATABASE_DETECTED"] = "SENS_HIGH_SQLITE_DATABASE_DETECTED";
|
|
258
|
+
VulnerabilityCode["SENS_HIGH_AWS_CONFIG_EXPOSED"] = "SENS_HIGH_AWS_CONFIG_EXPOSED";
|
|
259
|
+
VulnerabilityCode["SENS_HIGH_AZURE_CREDENTIALS_EXPOSED"] = "SENS_HIGH_AZURE_CREDENTIALS_EXPOSED";
|
|
260
|
+
VulnerabilityCode["SENS_HIGH_HELM_VALUES_EXPOSED"] = "SENS_HIGH_HELM_VALUES_EXPOSED";
|
|
261
|
+
VulnerabilityCode["SENS_HIGH_TERRAFORM_VARS_EXPOSED"] = "SENS_HIGH_TERRAFORM_VARS_EXPOSED";
|
|
262
|
+
VulnerabilityCode["SENS_HIGH_LARAVEL_LOG_EXPOSED"] = "SENS_HIGH_LARAVEL_LOG_EXPOSED";
|
|
263
|
+
VulnerabilityCode["SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED"] = "SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED";
|
|
264
|
+
VulnerabilityCode["SENS_HIGH_ADMINER_EXPOSED"] = "SENS_HIGH_ADMINER_EXPOSED";
|
|
265
|
+
VulnerabilityCode["SENS_HIGH_DEBUG_ENDPOINT_EXPOSED"] = "SENS_HIGH_DEBUG_ENDPOINT_EXPOSED";
|
|
266
|
+
VulnerabilityCode["SENS_HIGH_GO_DEBUG_VARS_EXPOSED"] = "SENS_HIGH_GO_DEBUG_VARS_EXPOSED";
|
|
267
|
+
VulnerabilityCode["SENS_HIGH_GO_PPROF_EXPOSED"] = "SENS_HIGH_GO_PPROF_EXPOSED";
|
|
268
|
+
VulnerabilityCode["SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED"] = "SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED";
|
|
269
|
+
VulnerabilityCode["SENS_HIGH_MONGO_RC_EXPOSED"] = "SENS_HIGH_MONGO_RC_EXPOSED";
|
|
270
|
+
// MEDIUM
|
|
271
|
+
VulnerabilityCode["SENS_MED_UN_PROTECTED_CONFIG_JSON"] = "SENS_MED_UN_PROTECTED_CONFIG_JSON";
|
|
272
|
+
VulnerabilityCode["SENS_MED_MERCURIAL_REPOSITORY_FOUND"] = "SENS_MED_MERCURIAL_REPOSITORY_FOUND";
|
|
273
|
+
VulnerabilityCode["SENS_MED_MERCURIAL_HGRC_EXPOSED"] = "SENS_MED_MERCURIAL_HGRC_EXPOSED";
|
|
274
|
+
VulnerabilityCode["SENS_MED_CVS_ROOT_EXPOSED"] = "SENS_MED_CVS_ROOT_EXPOSED";
|
|
275
|
+
VulnerabilityCode["SENS_MED_CVS_ENTRIES_EXPOSED"] = "SENS_MED_CVS_ENTRIES_EXPOSED";
|
|
276
|
+
VulnerabilityCode["SENS_MED_BAZAAR_REPO_EXPOSED"] = "SENS_MED_BAZAAR_REPO_EXPOSED";
|
|
277
|
+
VulnerabilityCode["SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED"] = "SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED";
|
|
278
|
+
VulnerabilityCode["SENS_MED_LARAVEL_LOG_VIEWER_ENABLED"] = "SENS_MED_LARAVEL_LOG_VIEWER_ENABLED";
|
|
279
|
+
VulnerabilityCode["SENS_MED_APACHE_HTACCESS_FILE_DETECTED"] = "SENS_MED_APACHE_HTACCESS_FILE_DETECTED";
|
|
280
|
+
VulnerabilityCode["SENS_MED_APACHE_SERVER_INFO_EXPOSED"] = "SENS_MED_APACHE_SERVER_INFO_EXPOSED";
|
|
281
|
+
VulnerabilityCode["SENS_MED_PACKAGE_DEPENDENCIES_DETECTED"] = "SENS_MED_PACKAGE_DEPENDENCIES_DETECTED";
|
|
282
|
+
VulnerabilityCode["SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED"] = "SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED";
|
|
283
|
+
VulnerabilityCode["SENS_MED_SSH_PUBLIC_KEY_EXPOSED"] = "SENS_MED_SSH_PUBLIC_KEY_EXPOSED";
|
|
284
|
+
VulnerabilityCode["SENS_MED_SSL_CERTIFICATE_EXPOSED"] = "SENS_MED_SSL_CERTIFICATE_EXPOSED";
|
|
285
|
+
VulnerabilityCode["SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED"] = "SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED";
|
|
286
|
+
VulnerabilityCode["SENS_MED_GRAPHI_QL_EXPOSED"] = "SENS_MED_GRAPHI_QL_EXPOSED";
|
|
287
|
+
VulnerabilityCode["SENS_MED_TERRAFORM_LOCK_EXPOSED"] = "SENS_MED_TERRAFORM_LOCK_EXPOSED";
|
|
288
|
+
VulnerabilityCode["SENS_MED_ERROR_LOG_EXPOSED"] = "SENS_MED_ERROR_LOG_EXPOSED";
|
|
289
|
+
VulnerabilityCode["SENS_MED_ACCESS_LOG_EXPOSED"] = "SENS_MED_ACCESS_LOG_EXPOSED";
|
|
290
|
+
VulnerabilityCode["SENS_MED_DEBUG_LOG_EXPOSED"] = "SENS_MED_DEBUG_LOG_EXPOSED";
|
|
291
|
+
VulnerabilityCode["SENS_MED_APPLICATION_LOG_EXPOSED"] = "SENS_MED_APPLICATION_LOG_EXPOSED";
|
|
292
|
+
VulnerabilityCode["SENS_MED_WSDL_EXPOSED"] = "SENS_MED_WSDL_EXPOSED";
|
|
293
|
+
VulnerabilityCode["SENS_MED_WORD_PRESS_XML_RPC_EXPOSED"] = "SENS_MED_WORD_PRESS_XML_RPC_EXPOSED";
|
|
294
|
+
// LOW
|
|
295
|
+
VulnerabilityCode["SENS_LOW_TOML_PROJECT_FILE_EXPOSED"] = "SENS_LOW_TOML_PROJECT_FILE_EXPOSED";
|
|
296
|
+
VulnerabilityCode["SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED";
|
|
297
|
+
VulnerabilityCode["SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED";
|
|
298
|
+
VulnerabilityCode["SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED"] = "SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED";
|
|
299
|
+
VulnerabilityCode["SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED"] = "SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED";
|
|
300
|
+
VulnerabilityCode["SENS_LOW_PYTHON_REQUIREMENTS_DETECTED"] = "SENS_LOW_PYTHON_REQUIREMENTS_DETECTED";
|
|
301
|
+
VulnerabilityCode["SENS_LOW_TEST_ENDPOINT_EXPOSED"] = "SENS_LOW_TEST_ENDPOINT_EXPOSED";
|
|
302
|
+
VulnerabilityCode["SENS_LOW_STAGING_ENDPOINT_EXPOSED"] = "SENS_LOW_STAGING_ENDPOINT_EXPOSED";
|
|
303
|
+
VulnerabilityCode["SENS_LOW_EDITOR_BACKUP_FILE_DETECTED"] = "SENS_LOW_EDITOR_BACKUP_FILE_DETECTED";
|
|
304
|
+
VulnerabilityCode["SENS_LOW_VIM_SWAP_FILE_DETECTED"] = "SENS_LOW_VIM_SWAP_FILE_DETECTED";
|
|
305
|
+
VulnerabilityCode["SENS_LOW_DIRECTORY_LISTING_ENABLED"] = "SENS_LOW_DIRECTORY_LISTING_ENABLED";
|
|
306
|
+
VulnerabilityCode["SENS_LOW_AWSSAM_TEMPLATE_EXPOSED"] = "SENS_LOW_AWSSAM_TEMPLATE_EXPOSED";
|
|
307
|
+
VulnerabilityCode["SENS_LOW_SERVERLESS_CONFIG_EXPOSED"] = "SENS_LOW_SERVERLESS_CONFIG_EXPOSED";
|
|
308
|
+
VulnerabilityCode["SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED"] = "SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED";
|
|
309
|
+
// ========================================
|
|
310
|
+
// CLICKJACKING (CLICK_*)
|
|
311
|
+
// ========================================
|
|
312
|
+
VulnerabilityCode["CLICK_FRAMEABLE"] = "CLICK_FRAMEABLE";
|
|
313
|
+
VulnerabilityCode["CLICK_PARTIAL_PROTECTION"] = "CLICK_PARTIAL_PROTECTION";
|
|
314
|
+
})(VulnerabilityCode || (exports.VulnerabilityCode = VulnerabilityCode = {}));
|
|
315
|
+
exports.default = VulnerabilityCode;
|
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Vulnerability Registry - Main Entry Point
|
|
4
|
+
*
|
|
5
|
+
* Exports all vulnerability codes, definitions, and lookup utilities
|
|
6
|
+
*/
|
|
7
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
+
exports.SENSITIVE_PATH_VULNERABILITIES = exports.CONFIG_VULNERABILITIES = exports.AUTH_VULNERABILITIES = exports.SSRF_VULNERABILITIES = exports.XSS_VULNERABILITIES = exports.INJECTION_VULNERABILITIES = exports.VulnerabilityCode = exports.VULNERABILITY_REGISTRY = void 0;
|
|
9
|
+
exports.getVulnerabilityDefinition = getVulnerabilityDefinition;
|
|
10
|
+
exports.getVulnerabilitiesByScanner = getVulnerabilitiesByScanner;
|
|
11
|
+
exports.getVulnerabilitiesByCategory = getVulnerabilitiesByCategory;
|
|
12
|
+
exports.getVulnerabilitiesBySeverity = getVulnerabilitiesBySeverity;
|
|
13
|
+
exports.getAllVulnerabilityCodes = getAllVulnerabilityCodes;
|
|
14
|
+
exports.getVulnerabilityCount = getVulnerabilityCount;
|
|
15
|
+
exports.createFinding = createFinding;
|
|
16
|
+
const error_codes_js_1 = require("./error-codes.js");
|
|
17
|
+
// Import all category definitions
|
|
18
|
+
const injection_js_1 = require("./categories/injection.js");
|
|
19
|
+
Object.defineProperty(exports, "INJECTION_VULNERABILITIES", { enumerable: true, get: function () { return injection_js_1.INJECTION_VULNERABILITIES; } });
|
|
20
|
+
const xss_js_1 = require("./categories/xss.js");
|
|
21
|
+
Object.defineProperty(exports, "XSS_VULNERABILITIES", { enumerable: true, get: function () { return xss_js_1.XSS_VULNERABILITIES; } });
|
|
22
|
+
const ssrf_js_1 = require("./categories/ssrf.js");
|
|
23
|
+
Object.defineProperty(exports, "SSRF_VULNERABILITIES", { enumerable: true, get: function () { return ssrf_js_1.SSRF_VULNERABILITIES; } });
|
|
24
|
+
const authentication_js_1 = require("./categories/authentication.js");
|
|
25
|
+
Object.defineProperty(exports, "AUTH_VULNERABILITIES", { enumerable: true, get: function () { return authentication_js_1.AUTH_VULNERABILITIES; } });
|
|
26
|
+
const configuration_js_1 = require("./categories/configuration.js");
|
|
27
|
+
Object.defineProperty(exports, "CONFIG_VULNERABILITIES", { enumerable: true, get: function () { return configuration_js_1.CONFIG_VULNERABILITIES; } });
|
|
28
|
+
const sensitive_paths_js_1 = require("./categories/sensitive-paths.js");
|
|
29
|
+
Object.defineProperty(exports, "SENSITIVE_PATH_VULNERABILITIES", { enumerable: true, get: function () { return sensitive_paths_js_1.SENSITIVE_PATH_VULNERABILITIES; } });
|
|
30
|
+
/**
|
|
31
|
+
* Complete vulnerability registry combining all categories
|
|
32
|
+
*/
|
|
33
|
+
exports.VULNERABILITY_REGISTRY = {
|
|
34
|
+
...injection_js_1.INJECTION_VULNERABILITIES,
|
|
35
|
+
...xss_js_1.XSS_VULNERABILITIES,
|
|
36
|
+
...ssrf_js_1.SSRF_VULNERABILITIES,
|
|
37
|
+
...authentication_js_1.AUTH_VULNERABILITIES,
|
|
38
|
+
...configuration_js_1.CONFIG_VULNERABILITIES,
|
|
39
|
+
...sensitive_paths_js_1.SENSITIVE_PATH_VULNERABILITIES,
|
|
40
|
+
};
|
|
41
|
+
/**
|
|
42
|
+
* Get vulnerability definition by code
|
|
43
|
+
*/
|
|
44
|
+
function getVulnerabilityDefinition(code) {
|
|
45
|
+
const definition = exports.VULNERABILITY_REGISTRY[code];
|
|
46
|
+
if (definition) {
|
|
47
|
+
return { found: true, definition };
|
|
48
|
+
}
|
|
49
|
+
return { found: false };
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Get all vulnerabilities for a specific scanner
|
|
53
|
+
*/
|
|
54
|
+
function getVulnerabilitiesByScanner(scanner) {
|
|
55
|
+
return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.scanner === scanner);
|
|
56
|
+
}
|
|
57
|
+
/**
|
|
58
|
+
* Get all vulnerabilities for a specific category
|
|
59
|
+
*/
|
|
60
|
+
function getVulnerabilitiesByCategory(category) {
|
|
61
|
+
return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.category === category);
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* Get all vulnerabilities for a specific severity
|
|
65
|
+
*/
|
|
66
|
+
function getVulnerabilitiesBySeverity(severity) {
|
|
67
|
+
return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.severity === severity);
|
|
68
|
+
}
|
|
69
|
+
/**
|
|
70
|
+
* Get all vulnerability codes
|
|
71
|
+
*/
|
|
72
|
+
function getAllVulnerabilityCodes() {
|
|
73
|
+
return Object.values(error_codes_js_1.VulnerabilityCode);
|
|
74
|
+
}
|
|
75
|
+
/**
|
|
76
|
+
* Get total count of registered vulnerabilities
|
|
77
|
+
*/
|
|
78
|
+
function getVulnerabilityCount() {
|
|
79
|
+
return Object.keys(exports.VULNERABILITY_REGISTRY).length;
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
* Create a finding with vulnerability definition
|
|
83
|
+
*/
|
|
84
|
+
function createFinding(code, overrides) {
|
|
85
|
+
const lookup = getVulnerabilityDefinition(code);
|
|
86
|
+
if (!lookup.found || !lookup.definition) {
|
|
87
|
+
return null;
|
|
88
|
+
}
|
|
89
|
+
return {
|
|
90
|
+
...lookup.definition,
|
|
91
|
+
...overrides,
|
|
92
|
+
};
|
|
93
|
+
}
|
|
94
|
+
// Re-export all types and enums
|
|
95
|
+
var error_codes_js_2 = require("./error-codes.js");
|
|
96
|
+
Object.defineProperty(exports, "VulnerabilityCode", { enumerable: true, get: function () { return error_codes_js_2.VulnerabilityCode; } });
|
|
97
|
+
exports.default = {
|
|
98
|
+
VulnerabilityCode: error_codes_js_1.VulnerabilityCode,
|
|
99
|
+
VULNERABILITY_REGISTRY: exports.VULNERABILITY_REGISTRY,
|
|
100
|
+
getVulnerabilityDefinition,
|
|
101
|
+
getVulnerabilitiesByScanner,
|
|
102
|
+
getVulnerabilitiesByCategory,
|
|
103
|
+
getVulnerabilitiesBySeverity,
|
|
104
|
+
getAllVulnerabilityCodes,
|
|
105
|
+
getVulnerabilityCount,
|
|
106
|
+
createFinding,
|
|
107
|
+
};
|
package/package.json
ADDED
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "@zerothreatai/vulnerability-registry",
|
|
3
|
+
"version": "1.0.0",
|
|
4
|
+
"description": "Centralized vulnerability definitions, CVSS scores, and references for ZeroThreat scanners",
|
|
5
|
+
"main": "dist/index.js",
|
|
6
|
+
"types": "dist/index.d.ts",
|
|
7
|
+
"type": "module",
|
|
8
|
+
"scripts": {
|
|
9
|
+
"build:esm": "tsc -p tsconfig.json",
|
|
10
|
+
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
11
|
+
"build": "npm run build:esm && npm run build:cjs",
|
|
12
|
+
"test": "vitest run"
|
|
13
|
+
},
|
|
14
|
+
"exports": {
|
|
15
|
+
".": {
|
|
16
|
+
"types": "./dist/index.d.ts",
|
|
17
|
+
"import": "./dist/index.js",
|
|
18
|
+
"require": "./dist-cjs/index.js"
|
|
19
|
+
},
|
|
20
|
+
"./types": {
|
|
21
|
+
"types": "./dist/types.d.ts",
|
|
22
|
+
"import": "./dist/types.js",
|
|
23
|
+
"require": "./dist-cjs/types.js"
|
|
24
|
+
},
|
|
25
|
+
"./error-codes": {
|
|
26
|
+
"types": "./dist/error-codes.d.ts",
|
|
27
|
+
"import": "./dist/error-codes.js",
|
|
28
|
+
"require": "./dist-cjs/error-codes.js"
|
|
29
|
+
}
|
|
30
|
+
},
|
|
31
|
+
"devDependencies": {
|
|
32
|
+
"typescript": "^5.0.0",
|
|
33
|
+
"vitest": "^1.0.0"
|
|
34
|
+
}
|
|
35
|
+
}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vulnerability Registry - Authentication & Access Control
|
|
3
|
+
*
|
|
4
|
+
* Definitions for JWT, Broken Access Control, and related issues
|
|
5
|
+
*/
|
|
6
|
+
import type { VulnerabilityDefinition } from '../types.js';
|
|
7
|
+
export declare const AUTH_VULNERABILITIES: Record<string, VulnerabilityDefinition>;
|
|
8
|
+
export default AUTH_VULNERABILITIES;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"authentication.d.ts","sourceRoot":"","sources":["authentication.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAGH,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,aAAa,CAAC;AAE3D,eAAO,MAAM,oBAAoB,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CA+XxE,CAAC;AAEF,eAAe,oBAAoB,CAAC"}
|