@zerothreatai/vulnerability-registry 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.d.ts +8 -0
- package/dist/categories/authentication.js +375 -0
- package/dist/categories/configuration.d.ts +8 -0
- package/dist/categories/configuration.js +903 -0
- package/dist/categories/injection.d.ts +8 -0
- package/dist/categories/injection.js +747 -0
- package/dist/categories/sensitive-paths.d.ts +9 -0
- package/dist/categories/sensitive-paths.js +1788 -0
- package/dist/categories/ssrf.d.ts +8 -0
- package/dist/categories/ssrf.js +247 -0
- package/dist/categories/xss.d.ts +7 -0
- package/dist/categories/xss.js +325 -0
- package/dist/error-codes.d.ts +242 -0
- package/dist/error-codes.js +312 -0
- package/dist/index.d.ts +60 -0
- package/dist/index.js +92 -0
- package/dist/types.d.ts +86 -0
- package/dist/types.js +6 -0
- package/dist-cjs/categories/authentication.js +378 -0
- package/dist-cjs/categories/configuration.js +906 -0
- package/dist-cjs/categories/injection.js +750 -0
- package/dist-cjs/categories/sensitive-paths.js +1791 -0
- package/dist-cjs/categories/ssrf.js +250 -0
- package/dist-cjs/categories/xss.js +328 -0
- package/dist-cjs/error-codes.js +315 -0
- package/dist-cjs/index.js +107 -0
- package/dist-cjs/types.js +7 -0
- package/package.json +35 -0
- package/src/categories/authentication.d.ts +8 -0
- package/src/categories/authentication.d.ts.map +1 -0
- package/src/categories/authentication.js +378 -0
- package/src/categories/authentication.js.map +1 -0
- package/src/categories/authentication.ts +395 -0
- package/src/categories/configuration.d.ts +8 -0
- package/src/categories/configuration.d.ts.map +1 -0
- package/src/categories/configuration.js +906 -0
- package/src/categories/configuration.js.map +1 -0
- package/src/categories/configuration.ts +948 -0
- package/src/categories/injection.d.ts +8 -0
- package/src/categories/injection.d.ts.map +1 -0
- package/src/categories/injection.js +750 -0
- package/src/categories/injection.js.map +1 -0
- package/src/categories/injection.ts +785 -0
- package/src/categories/sensitive-paths.d.ts +9 -0
- package/src/categories/sensitive-paths.d.ts.map +1 -0
- package/src/categories/sensitive-paths.js +1791 -0
- package/src/categories/sensitive-paths.js.map +1 -0
- package/src/categories/sensitive-paths.ts +1875 -0
- package/src/categories/ssrf.d.ts +8 -0
- package/src/categories/ssrf.d.ts.map +1 -0
- package/src/categories/ssrf.js +250 -0
- package/src/categories/ssrf.js.map +1 -0
- package/src/categories/ssrf.ts +261 -0
- package/src/categories/xss.d.ts +7 -0
- package/src/categories/xss.d.ts.map +1 -0
- package/src/categories/xss.js +328 -0
- package/src/categories/xss.js.map +1 -0
- package/src/categories/xss.ts +342 -0
- package/src/error-codes.d.ts +242 -0
- package/src/error-codes.d.ts.map +1 -0
- package/src/error-codes.js +315 -0
- package/src/error-codes.js.map +1 -0
- package/src/error-codes.ts +334 -0
- package/src/index.d.ts +60 -0
- package/src/index.d.ts.map +1 -0
- package/src/index.js +107 -0
- package/src/index.js.map +1 -0
- package/src/index.ts +126 -0
- package/src/types.d.ts +86 -0
- package/src/types.d.ts.map +1 -0
- package/src/types.js +7 -0
- package/src/types.js.map +1 -0
- package/src/types.ts +109 -0
- package/tsconfig.cjs.json +8 -0
- package/tsconfig.json +21 -0
- package/vulnerability-registry.zip +0 -0
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vulnerability Registry - SSRF and Misconfiguration Vulnerabilities
|
|
3
|
+
*
|
|
4
|
+
* Definitions for SSRF, Open Redirect, Host Header, and related issues
|
|
5
|
+
*/
|
|
6
|
+
import type { VulnerabilityDefinition } from '../types.js';
|
|
7
|
+
export declare const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition>;
|
|
8
|
+
export default SSRF_VULNERABILITIES;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ssrf.d.ts","sourceRoot":"","sources":["ssrf.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAGH,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,aAAa,CAAC;AAE3D,eAAO,MAAM,oBAAoB,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAyPxE,CAAC;AAEF,eAAe,oBAAoB,CAAC"}
|
|
@@ -0,0 +1,250 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Vulnerability Registry - SSRF and Misconfiguration Vulnerabilities
|
|
4
|
+
*
|
|
5
|
+
* Definitions for SSRF, Open Redirect, Host Header, and related issues
|
|
6
|
+
*/
|
|
7
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
+
exports.SSRF_VULNERABILITIES = void 0;
|
|
9
|
+
const error_codes_js_1 = require("../error-codes.js");
|
|
10
|
+
exports.SSRF_VULNERABILITIES = {
|
|
11
|
+
[error_codes_js_1.VulnerabilityCode.SSRF_CLOUD_METADATA]: {
|
|
12
|
+
id: 46,
|
|
13
|
+
code: error_codes_js_1.VulnerabilityCode.SSRF_CLOUD_METADATA,
|
|
14
|
+
title: 'Server-Side Request Forgery - Cloud Metadata Access',
|
|
15
|
+
description: 'Critical SSRF vulnerability enabling access to cloud provider metadata services (AWS IMDSv1, GCP, Azure) which expose sensitive information including IAM credentials, API tokens, and instance configuration that can lead to full cloud account compromise and lateral movement.',
|
|
16
|
+
severity: 'critical',
|
|
17
|
+
category: 'ssrf',
|
|
18
|
+
scanner: 'ssrf',
|
|
19
|
+
cvss: {
|
|
20
|
+
score: 9.1,
|
|
21
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N',
|
|
22
|
+
severity: 'CRITICAL',
|
|
23
|
+
},
|
|
24
|
+
cwe: [
|
|
25
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
26
|
+
],
|
|
27
|
+
owasp: [
|
|
28
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
29
|
+
],
|
|
30
|
+
remediation: 'Block access to cloud metadata IP ranges (169.254.169.254). Implement IMDSv2 which requires tokens. Use allowlist for external URLs. Validate and sanitize all URL inputs.',
|
|
31
|
+
},
|
|
32
|
+
[error_codes_js_1.VulnerabilityCode.SSRF_INTERNAL_SERVICE]: {
|
|
33
|
+
id: 47,
|
|
34
|
+
code: error_codes_js_1.VulnerabilityCode.SSRF_INTERNAL_SERVICE,
|
|
35
|
+
title: 'Server-Side Request Forgery - Internal Service Access',
|
|
36
|
+
description: 'SSRF vulnerability allowing attackers to access internal network services that should not be reachable from the internet, including databases, admin panels, cache servers, and other infrastructure components protected only by network segmentation without authentication.',
|
|
37
|
+
severity: 'high',
|
|
38
|
+
category: 'ssrf',
|
|
39
|
+
scanner: 'ssrf',
|
|
40
|
+
cvss: {
|
|
41
|
+
score: 7.5,
|
|
42
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N',
|
|
43
|
+
severity: 'HIGH',
|
|
44
|
+
},
|
|
45
|
+
cwe: [
|
|
46
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
47
|
+
],
|
|
48
|
+
owasp: [
|
|
49
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
50
|
+
],
|
|
51
|
+
remediation: 'Implement URL allowlist for permitted external resources. Block requests to private IP ranges and localhost. Use network segmentation with proper authentication for internal services.',
|
|
52
|
+
},
|
|
53
|
+
[error_codes_js_1.VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING]: {
|
|
54
|
+
id: 48,
|
|
55
|
+
code: error_codes_js_1.VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING,
|
|
56
|
+
title: 'Server-Side Request Forgery - Protocol Smuggling',
|
|
57
|
+
description: 'SSRF vulnerability exploiting non-HTTP protocol handlers like file://, gopher://, dict://, or ftp:// to read local files, interact with internal services using raw TCP, or perform attacks that would not be possible through HTTP requests alone, significantly expanding impact scope.',
|
|
58
|
+
severity: 'high',
|
|
59
|
+
category: 'ssrf',
|
|
60
|
+
scanner: 'ssrf',
|
|
61
|
+
cvss: {
|
|
62
|
+
score: 8.6,
|
|
63
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N',
|
|
64
|
+
severity: 'HIGH',
|
|
65
|
+
},
|
|
66
|
+
cwe: [
|
|
67
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
68
|
+
],
|
|
69
|
+
owasp: [
|
|
70
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
71
|
+
],
|
|
72
|
+
remediation: 'Enforce HTTP/HTTPS only for outbound requests. Disable or block dangerous protocol handlers at the application and network level. Validate URL schemes against strict allowlist.',
|
|
73
|
+
},
|
|
74
|
+
[error_codes_js_1.VulnerabilityCode.SSRF_BLIND_OOB]: {
|
|
75
|
+
id: 49,
|
|
76
|
+
code: error_codes_js_1.VulnerabilityCode.SSRF_BLIND_OOB,
|
|
77
|
+
title: 'Server-Side Request Forgery - Blind OOB',
|
|
78
|
+
description: 'Blind SSRF vulnerability confirmed through out-of-band DNS or HTTP callbacks indicating the server makes requests to attacker-controlled destinations even though responses are not reflected, enabling internal network scanning and data exfiltration through DNS or timing side channels.',
|
|
79
|
+
severity: 'medium',
|
|
80
|
+
category: 'ssrf',
|
|
81
|
+
scanner: 'ssrf',
|
|
82
|
+
cvss: {
|
|
83
|
+
score: 5.3,
|
|
84
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
|
|
85
|
+
severity: 'MEDIUM',
|
|
86
|
+
},
|
|
87
|
+
cwe: [
|
|
88
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
89
|
+
],
|
|
90
|
+
owasp: [
|
|
91
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
92
|
+
],
|
|
93
|
+
remediation: 'Implement URL allowlist validation. Block outbound DNS to untrusted domains. Use egress firewall rules. Monitor for unusual outbound connection patterns.',
|
|
94
|
+
},
|
|
95
|
+
// ========================================
|
|
96
|
+
// OPEN REDIRECT
|
|
97
|
+
// ========================================
|
|
98
|
+
[error_codes_js_1.VulnerabilityCode.REDIRECT_HEADER_INJECTION]: {
|
|
99
|
+
id: 50,
|
|
100
|
+
code: error_codes_js_1.VulnerabilityCode.REDIRECT_HEADER_INJECTION,
|
|
101
|
+
title: 'Open Redirect - HTTP Header Injection',
|
|
102
|
+
description: 'Open redirect vulnerability through Location header manipulation allowing attackers to redirect victims to malicious websites after authenticating or interacting with the legitimate application, facilitating phishing attacks that abuse user trust in the original domain.',
|
|
103
|
+
severity: 'medium',
|
|
104
|
+
category: 'business_logic',
|
|
105
|
+
scanner: 'redirect-route',
|
|
106
|
+
cvss: {
|
|
107
|
+
score: 5.3,
|
|
108
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
109
|
+
severity: 'MEDIUM',
|
|
110
|
+
},
|
|
111
|
+
cwe: [
|
|
112
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
113
|
+
],
|
|
114
|
+
owasp: [
|
|
115
|
+
{ id: 'A01:2021', name: 'Broken Access Control', url: 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/' },
|
|
116
|
+
],
|
|
117
|
+
remediation: 'Use allowlist of permitted redirect destinations. Avoid using user input for redirect URLs. If redirects are required, use indirect references or validate against known safe patterns.',
|
|
118
|
+
},
|
|
119
|
+
[error_codes_js_1.VulnerabilityCode.REDIRECT_JS_NAVIGATION]: {
|
|
120
|
+
id: 51,
|
|
121
|
+
code: error_codes_js_1.VulnerabilityCode.REDIRECT_JS_NAVIGATION,
|
|
122
|
+
title: 'Open Redirect - JavaScript Navigation',
|
|
123
|
+
description: 'Client-side open redirect vulnerability through JavaScript navigation methods like window.location or location.href being set to user-controlled values, allowing attackers to redirect users to malicious sites through specially crafted URLs that bypass server-side validation.',
|
|
124
|
+
severity: 'medium',
|
|
125
|
+
category: 'business_logic',
|
|
126
|
+
scanner: 'redirect-route',
|
|
127
|
+
cvss: {
|
|
128
|
+
score: 5.3,
|
|
129
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
130
|
+
severity: 'MEDIUM',
|
|
131
|
+
},
|
|
132
|
+
cwe: [
|
|
133
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
134
|
+
],
|
|
135
|
+
owasp: [
|
|
136
|
+
{ id: 'A01:2021', name: 'Broken Access Control', url: 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/' },
|
|
137
|
+
],
|
|
138
|
+
remediation: 'Validate redirect URLs on both client and server side. Use allowlist of permitted domains. Never pass raw URL parameters to navigation functions without validation.',
|
|
139
|
+
},
|
|
140
|
+
// ========================================
|
|
141
|
+
// HOST HEADER INJECTION
|
|
142
|
+
// ========================================
|
|
143
|
+
[error_codes_js_1.VulnerabilityCode.HOST_CACHE_POISONING]: {
|
|
144
|
+
id: 52,
|
|
145
|
+
code: error_codes_js_1.VulnerabilityCode.HOST_CACHE_POISONING,
|
|
146
|
+
title: 'Host Header Injection - Cache Poisoning',
|
|
147
|
+
description: 'Host header injection vulnerability where manipulated Host headers are reflected in cached responses, allowing attackers to poison web caches and CDNs with malicious content that is then served to all users, potentially enabling widespread defacement or malware distribution.',
|
|
148
|
+
severity: 'high',
|
|
149
|
+
category: 'configuration',
|
|
150
|
+
scanner: 'host-header',
|
|
151
|
+
cvss: {
|
|
152
|
+
score: 6.5,
|
|
153
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N',
|
|
154
|
+
severity: 'MEDIUM',
|
|
155
|
+
},
|
|
156
|
+
cwe: [
|
|
157
|
+
{ id: 'CWE-644', name: 'Improper Neutralization of HTTP Headers', url: 'https://cwe.mitre.org/data/definitions/644.html' },
|
|
158
|
+
],
|
|
159
|
+
owasp: [
|
|
160
|
+
{ id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
|
|
161
|
+
],
|
|
162
|
+
remediation: 'Configure web servers to reject requests with unexpected Host headers. Include Host header in cache keys. Use canonical URLs for all generated links.',
|
|
163
|
+
},
|
|
164
|
+
[error_codes_js_1.VulnerabilityCode.HOST_PASSWORD_RESET]: {
|
|
165
|
+
id: 53,
|
|
166
|
+
code: error_codes_js_1.VulnerabilityCode.HOST_PASSWORD_RESET,
|
|
167
|
+
title: 'Host Header Injection - Password Reset Poisoning',
|
|
168
|
+
description: 'Critical host header injection vulnerability in password reset functionality where the injected Host header is used to generate password reset URLs, allowing attackers to receive password reset tokens when victims click the manipulated links in legitimate reset emails.',
|
|
169
|
+
severity: 'high',
|
|
170
|
+
category: 'configuration',
|
|
171
|
+
scanner: 'host-header',
|
|
172
|
+
cvss: {
|
|
173
|
+
score: 7.5,
|
|
174
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N',
|
|
175
|
+
severity: 'HIGH',
|
|
176
|
+
},
|
|
177
|
+
cwe: [
|
|
178
|
+
{ id: 'CWE-644', name: 'Improper Neutralization of HTTP Headers', url: 'https://cwe.mitre.org/data/definitions/644.html' },
|
|
179
|
+
],
|
|
180
|
+
owasp: [
|
|
181
|
+
{ id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
|
|
182
|
+
],
|
|
183
|
+
remediation: 'Use hardcoded canonical domain for generated URLs. Never trust Host header for security-sensitive functionality. Validate Host header against configured allowed hosts.',
|
|
184
|
+
},
|
|
185
|
+
[error_codes_js_1.VulnerabilityCode.SSRF_FILTER_BYPASS]: {
|
|
186
|
+
id: 54,
|
|
187
|
+
code: error_codes_js_1.VulnerabilityCode.SSRF_FILTER_BYPASS,
|
|
188
|
+
title: 'Server-Side Request Forgery - Filter Bypass',
|
|
189
|
+
description: 'SSRF vulnerability that bypasses security filters through encoding tricks (URL encoding, IPv6 representation, decimal IP notation), DNS rebinding, or using alternative representations of blocked addresses to reach internal resources despite URL validation controls.',
|
|
190
|
+
severity: 'high',
|
|
191
|
+
category: 'ssrf',
|
|
192
|
+
scanner: 'ssrf',
|
|
193
|
+
cvss: {
|
|
194
|
+
score: 7.5,
|
|
195
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N',
|
|
196
|
+
severity: 'HIGH',
|
|
197
|
+
},
|
|
198
|
+
cwe: [
|
|
199
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
200
|
+
],
|
|
201
|
+
owasp: [
|
|
202
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
203
|
+
],
|
|
204
|
+
remediation: 'Implement defense-in-depth with multiple validation layers. Resolve DNS before validation. Use strict URL parsing libraries. Block all private IP ranges including encoded forms.',
|
|
205
|
+
},
|
|
206
|
+
[error_codes_js_1.VulnerabilityCode.REDIRECT_META_REFRESH]: {
|
|
207
|
+
id: 55,
|
|
208
|
+
code: error_codes_js_1.VulnerabilityCode.REDIRECT_META_REFRESH,
|
|
209
|
+
title: 'Open Redirect - Meta Refresh',
|
|
210
|
+
description: 'Open redirect vulnerability through HTML meta refresh tags where user input controls the redirect target URL, enabling phishing attacks by sending victims to malicious sites after a brief delay on the legitimate domain, bypassing some security controls.',
|
|
211
|
+
severity: 'low',
|
|
212
|
+
category: 'business_logic',
|
|
213
|
+
scanner: 'redirect-route',
|
|
214
|
+
cvss: {
|
|
215
|
+
score: 4.3,
|
|
216
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
217
|
+
severity: 'MEDIUM',
|
|
218
|
+
},
|
|
219
|
+
cwe: [
|
|
220
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
221
|
+
],
|
|
222
|
+
owasp: [
|
|
223
|
+
{ id: 'A01:2021', name: 'Broken Access Control', url: 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/' },
|
|
224
|
+
],
|
|
225
|
+
remediation: 'Validate meta refresh URLs against allowlist. Avoid using user input in meta refresh tags. Prefer server-side redirects with proper validation over client-side meta refresh.',
|
|
226
|
+
},
|
|
227
|
+
[error_codes_js_1.VulnerabilityCode.HOST_REDIRECT]: {
|
|
228
|
+
id: 56,
|
|
229
|
+
code: error_codes_js_1.VulnerabilityCode.HOST_REDIRECT,
|
|
230
|
+
title: 'Host Header Injection - Open Redirect',
|
|
231
|
+
description: 'Host header injection leading to open redirect where the application uses the Host header to generate redirect URLs, allowing attackers to redirect users to malicious domains by manipulating the Host header in their requests.',
|
|
232
|
+
severity: 'medium',
|
|
233
|
+
category: 'configuration',
|
|
234
|
+
scanner: 'host-header',
|
|
235
|
+
cvss: {
|
|
236
|
+
score: 5.3,
|
|
237
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
238
|
+
severity: 'MEDIUM',
|
|
239
|
+
},
|
|
240
|
+
cwe: [
|
|
241
|
+
{ id: 'CWE-644', name: 'Improper Neutralization of HTTP Headers', url: 'https://cwe.mitre.org/data/definitions/644.html' },
|
|
242
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
243
|
+
],
|
|
244
|
+
owasp: [
|
|
245
|
+
{ id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
|
|
246
|
+
],
|
|
247
|
+
remediation: 'Configure web server to validate Host header. Use hardcoded domain for redirect URLs. Implement allowlist for accepted Host header values.',
|
|
248
|
+
},
|
|
249
|
+
};
|
|
250
|
+
exports.default = exports.SSRF_VULNERABILITIES;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ssrf.js","sourceRoot":"","sources":["ssrf.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,mBAAmB,CAAC;AAGtD,MAAM,CAAC,MAAM,oBAAoB,GAA4C;IACzE,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,EAAE;QACrC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,mBAAmB;QAC3C,KAAK,EAAE,qDAAqD;QAC5D,WAAW,EAAE,oRAAoR;QACjS,QAAQ,EAAE,UAAU;QACpB,QAAQ,EAAE,MAAM;QAChB,OAAO,EAAE,MAAM;QACf,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,UAAU;SACvB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,iDAAiD,EAAE;SAC1F;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,0EAA0E,EAAE;SACpH;QACD,WAAW,EAAE,4KAA4K;KAC5L;IAED,CAAC,iBAAiB,CAAC,qBAAqB,CAAC,EAAE;QACvC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,qBAAqB;QAC7C,KAAK,EAAE,uDAAuD;QAC9D,WAAW,EAAE,gRAAgR;QAC7R,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,MAAM;QAChB,OAAO,EAAE,MAAM;QACf,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,iDAAiD,EAAE;SAC1F;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,0EAA0E,EAAE;SACpH;QACD,WAAW,EAAE,yLAAyL;KACzM;IAED,CAAC,iBAAiB,CAAC,uBAAuB,CAAC,EAAE;QACzC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,uBAAuB;QAC/C,KAAK,EAAE,kDAAkD;QACzD,WAAW,EAAE,2RAA2R;QACxS,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,MAAM;QAChB,OAAO,EAAE,MAAM;QACf,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,iDAAiD,EAAE;SAC1F;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,0EAA0E,EAAE;SACpH;QACD,WAAW,EAAE,kLAAkL;KAClM;IAED,CAAC,iBAAiB,CAAC,cAAc,CAAC,EAAE;QAChC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,cAAc;QACtC,KAAK,EAAE,yCAAyC;QAChD,WAAW,EAAE,8RAA8R;QAC3S,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,MAAM;QAChB,OAAO,EAAE,MAAM;QACf,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,iDAAiD,EAAE;SAC1F;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,0EAA0E,EAAE;SACpH;QACD,WAAW,EAAE,2JAA2J;KAC3K;IAED,2CAA2C;IAC3C,gBAAgB;IAChB,2CAA2C;IAC3C,CAAC,iBAAiB,CAAC,yBAAyB,CAAC,EAAE;QAC3C,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,yBAAyB;QACjD,KAAK,EAAE,uCAAuC;QAC9C,WAAW,EAAE,gRAAgR;QAC7R,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,gBAAgB;QAC1B,OAAO,EAAE,gBAAgB;QACzB,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,iBAAiB,EAAE,GAAG,EAAE,iDAAiD,EAAE;SACrG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,uBAAuB,EAAE,GAAG,EAAE,yDAAyD,EAAE;SACpH;QACD,WAAW,EAAE,yLAAyL;KACzM;IAED,CAAC,iBAAiB,CAAC,sBAAsB,CAAC,EAAE;QACxC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,sBAAsB;QAC9C,KAAK,EAAE,uCAAuC;QAC9C,WAAW,EAAE,qRAAqR;QAClS,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,gBAAgB;QAC1B,OAAO,EAAE,gBAAgB;QACzB,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,iBAAiB,EAAE,GAAG,EAAE,iDAAiD,EAAE;SACrG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,uBAAuB,EAAE,GAAG,EAAE,yDAAyD,EAAE;SACpH;QACD,WAAW,EAAE,sKAAsK;KACtL;IAED,2CAA2C;IAC3C,wBAAwB;IACxB,2CAA2C;IAC3C,CAAC,iBAAiB,CAAC,oBAAoB,CAAC,EAAE;QACtC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,oBAAoB;QAC5C,KAAK,EAAE,yCAAyC;QAChD,WAAW,EAAE,qRAAqR;QAClS,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,eAAe;QACzB,OAAO,EAAE,aAAa;QACtB,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,yCAAyC,EAAE,GAAG,EAAE,iDAAiD,EAAE;SAC7H;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,2BAA2B,EAAE,GAAG,EAAE,6DAA6D,EAAE;SAC5H;QACD,WAAW,EAAE,uJAAuJ;KACvK;IAED,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,EAAE;QACrC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,mBAAmB;QAC3C,KAAK,EAAE,kDAAkD;QACzD,WAAW,EAAE,+QAA+Q;QAC5R,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,eAAe;QACzB,OAAO,EAAE,aAAa;QACtB,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,yCAAyC,EAAE,GAAG,EAAE,iDAAiD,EAAE;SAC7H;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,2BAA2B,EAAE,GAAG,EAAE,6DAA6D,EAAE;SAC5H;QACD,WAAW,EAAE,yKAAyK;KACzL;IAED,CAAC,iBAAiB,CAAC,kBAAkB,CAAC,EAAE;QACpC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,kBAAkB;QAC1C,KAAK,EAAE,6CAA6C;QACpD,WAAW,EAAE,2QAA2Q;QACxR,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,MAAM;QAChB,OAAO,EAAE,MAAM;QACf,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,iDAAiD,EAAE;SAC1F;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,0EAA0E,EAAE;SACpH;QACD,WAAW,EAAE,mLAAmL;KACnM;IAED,CAAC,iBAAiB,CAAC,qBAAqB,CAAC,EAAE;QACvC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,qBAAqB;QAC7C,KAAK,EAAE,8BAA8B;QACrC,WAAW,EAAE,+PAA+P;QAC5Q,QAAQ,EAAE,KAAK;QACf,QAAQ,EAAE,gBAAgB;QAC1B,OAAO,EAAE,gBAAgB;QACzB,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,iBAAiB,EAAE,GAAG,EAAE,iDAAiD,EAAE;SACrG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,uBAAuB,EAAE,GAAG,EAAE,yDAAyD,EAAE;SACpH;QACD,WAAW,EAAE,+KAA+K;KAC/L;IAED,CAAC,iBAAiB,CAAC,aAAa,CAAC,EAAE;QAC/B,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,aAAa;QACrC,KAAK,EAAE,uCAAuC;QAC9C,WAAW,EAAE,mOAAmO;QAChP,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,eAAe;QACzB,OAAO,EAAE,aAAa;QACtB,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,yCAAyC,EAAE,GAAG,EAAE,iDAAiD,EAAE;YAC1H,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,iBAAiB,EAAE,GAAG,EAAE,iDAAiD,EAAE;SACrG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,2BAA2B,EAAE,GAAG,EAAE,6DAA6D,EAAE;SAC5H;QACD,WAAW,EAAE,4IAA4I;KAC5J;CACJ,CAAC;AAEF,eAAe,oBAAoB,CAAC"}
|
|
@@ -0,0 +1,261 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vulnerability Registry - SSRF and Misconfiguration Vulnerabilities
|
|
3
|
+
*
|
|
4
|
+
* Definitions for SSRF, Open Redirect, Host Header, and related issues
|
|
5
|
+
*/
|
|
6
|
+
|
|
7
|
+
import { VulnerabilityCode } from '../error-codes.js';
|
|
8
|
+
import type { VulnerabilityDefinition } from '../types.js';
|
|
9
|
+
|
|
10
|
+
export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
11
|
+
[VulnerabilityCode.SSRF_CLOUD_METADATA]: {
|
|
12
|
+
id: 46,
|
|
13
|
+
code: VulnerabilityCode.SSRF_CLOUD_METADATA,
|
|
14
|
+
title: 'Server-Side Request Forgery - Cloud Metadata Access',
|
|
15
|
+
description: 'Critical SSRF vulnerability enabling access to cloud provider metadata services (AWS IMDSv1, GCP, Azure) which expose sensitive information including IAM credentials, API tokens, and instance configuration that can lead to full cloud account compromise and lateral movement.',
|
|
16
|
+
severity: 'critical',
|
|
17
|
+
category: 'ssrf',
|
|
18
|
+
scanner: 'ssrf',
|
|
19
|
+
cvss: {
|
|
20
|
+
score: 9.1,
|
|
21
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N',
|
|
22
|
+
severity: 'CRITICAL',
|
|
23
|
+
},
|
|
24
|
+
cwe: [
|
|
25
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
26
|
+
],
|
|
27
|
+
owasp: [
|
|
28
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
29
|
+
],
|
|
30
|
+
remediation: 'Block access to cloud metadata IP ranges (169.254.169.254). Implement IMDSv2 which requires tokens. Use allowlist for external URLs. Validate and sanitize all URL inputs.',
|
|
31
|
+
},
|
|
32
|
+
|
|
33
|
+
[VulnerabilityCode.SSRF_INTERNAL_SERVICE]: {
|
|
34
|
+
id: 47,
|
|
35
|
+
code: VulnerabilityCode.SSRF_INTERNAL_SERVICE,
|
|
36
|
+
title: 'Server-Side Request Forgery - Internal Service Access',
|
|
37
|
+
description: 'SSRF vulnerability allowing attackers to access internal network services that should not be reachable from the internet, including databases, admin panels, cache servers, and other infrastructure components protected only by network segmentation without authentication.',
|
|
38
|
+
severity: 'high',
|
|
39
|
+
category: 'ssrf',
|
|
40
|
+
scanner: 'ssrf',
|
|
41
|
+
cvss: {
|
|
42
|
+
score: 7.5,
|
|
43
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N',
|
|
44
|
+
severity: 'HIGH',
|
|
45
|
+
},
|
|
46
|
+
cwe: [
|
|
47
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
48
|
+
],
|
|
49
|
+
owasp: [
|
|
50
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
51
|
+
],
|
|
52
|
+
remediation: 'Implement URL allowlist for permitted external resources. Block requests to private IP ranges and localhost. Use network segmentation with proper authentication for internal services.',
|
|
53
|
+
},
|
|
54
|
+
|
|
55
|
+
[VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING]: {
|
|
56
|
+
id: 48,
|
|
57
|
+
code: VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING,
|
|
58
|
+
title: 'Server-Side Request Forgery - Protocol Smuggling',
|
|
59
|
+
description: 'SSRF vulnerability exploiting non-HTTP protocol handlers like file://, gopher://, dict://, or ftp:// to read local files, interact with internal services using raw TCP, or perform attacks that would not be possible through HTTP requests alone, significantly expanding impact scope.',
|
|
60
|
+
severity: 'high',
|
|
61
|
+
category: 'ssrf',
|
|
62
|
+
scanner: 'ssrf',
|
|
63
|
+
cvss: {
|
|
64
|
+
score: 8.6,
|
|
65
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N',
|
|
66
|
+
severity: 'HIGH',
|
|
67
|
+
},
|
|
68
|
+
cwe: [
|
|
69
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
70
|
+
],
|
|
71
|
+
owasp: [
|
|
72
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
73
|
+
],
|
|
74
|
+
remediation: 'Enforce HTTP/HTTPS only for outbound requests. Disable or block dangerous protocol handlers at the application and network level. Validate URL schemes against strict allowlist.',
|
|
75
|
+
},
|
|
76
|
+
|
|
77
|
+
[VulnerabilityCode.SSRF_BLIND_OOB]: {
|
|
78
|
+
id: 49,
|
|
79
|
+
code: VulnerabilityCode.SSRF_BLIND_OOB,
|
|
80
|
+
title: 'Server-Side Request Forgery - Blind OOB',
|
|
81
|
+
description: 'Blind SSRF vulnerability confirmed through out-of-band DNS or HTTP callbacks indicating the server makes requests to attacker-controlled destinations even though responses are not reflected, enabling internal network scanning and data exfiltration through DNS or timing side channels.',
|
|
82
|
+
severity: 'medium',
|
|
83
|
+
category: 'ssrf',
|
|
84
|
+
scanner: 'ssrf',
|
|
85
|
+
cvss: {
|
|
86
|
+
score: 5.3,
|
|
87
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
|
|
88
|
+
severity: 'MEDIUM',
|
|
89
|
+
},
|
|
90
|
+
cwe: [
|
|
91
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
92
|
+
],
|
|
93
|
+
owasp: [
|
|
94
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
95
|
+
],
|
|
96
|
+
remediation: 'Implement URL allowlist validation. Block outbound DNS to untrusted domains. Use egress firewall rules. Monitor for unusual outbound connection patterns.',
|
|
97
|
+
},
|
|
98
|
+
|
|
99
|
+
// ========================================
|
|
100
|
+
// OPEN REDIRECT
|
|
101
|
+
// ========================================
|
|
102
|
+
[VulnerabilityCode.REDIRECT_HEADER_INJECTION]: {
|
|
103
|
+
id: 50,
|
|
104
|
+
code: VulnerabilityCode.REDIRECT_HEADER_INJECTION,
|
|
105
|
+
title: 'Open Redirect - HTTP Header Injection',
|
|
106
|
+
description: 'Open redirect vulnerability through Location header manipulation allowing attackers to redirect victims to malicious websites after authenticating or interacting with the legitimate application, facilitating phishing attacks that abuse user trust in the original domain.',
|
|
107
|
+
severity: 'medium',
|
|
108
|
+
category: 'business_logic',
|
|
109
|
+
scanner: 'redirect-route',
|
|
110
|
+
cvss: {
|
|
111
|
+
score: 5.3,
|
|
112
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
113
|
+
severity: 'MEDIUM',
|
|
114
|
+
},
|
|
115
|
+
cwe: [
|
|
116
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
117
|
+
],
|
|
118
|
+
owasp: [
|
|
119
|
+
{ id: 'A01:2021', name: 'Broken Access Control', url: 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/' },
|
|
120
|
+
],
|
|
121
|
+
remediation: 'Use allowlist of permitted redirect destinations. Avoid using user input for redirect URLs. If redirects are required, use indirect references or validate against known safe patterns.',
|
|
122
|
+
},
|
|
123
|
+
|
|
124
|
+
[VulnerabilityCode.REDIRECT_JS_NAVIGATION]: {
|
|
125
|
+
id: 51,
|
|
126
|
+
code: VulnerabilityCode.REDIRECT_JS_NAVIGATION,
|
|
127
|
+
title: 'Open Redirect - JavaScript Navigation',
|
|
128
|
+
description: 'Client-side open redirect vulnerability through JavaScript navigation methods like window.location or location.href being set to user-controlled values, allowing attackers to redirect users to malicious sites through specially crafted URLs that bypass server-side validation.',
|
|
129
|
+
severity: 'medium',
|
|
130
|
+
category: 'business_logic',
|
|
131
|
+
scanner: 'redirect-route',
|
|
132
|
+
cvss: {
|
|
133
|
+
score: 5.3,
|
|
134
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
135
|
+
severity: 'MEDIUM',
|
|
136
|
+
},
|
|
137
|
+
cwe: [
|
|
138
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
139
|
+
],
|
|
140
|
+
owasp: [
|
|
141
|
+
{ id: 'A01:2021', name: 'Broken Access Control', url: 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/' },
|
|
142
|
+
],
|
|
143
|
+
remediation: 'Validate redirect URLs on both client and server side. Use allowlist of permitted domains. Never pass raw URL parameters to navigation functions without validation.',
|
|
144
|
+
},
|
|
145
|
+
|
|
146
|
+
// ========================================
|
|
147
|
+
// HOST HEADER INJECTION
|
|
148
|
+
// ========================================
|
|
149
|
+
[VulnerabilityCode.HOST_CACHE_POISONING]: {
|
|
150
|
+
id: 52,
|
|
151
|
+
code: VulnerabilityCode.HOST_CACHE_POISONING,
|
|
152
|
+
title: 'Host Header Injection - Cache Poisoning',
|
|
153
|
+
description: 'Host header injection vulnerability where manipulated Host headers are reflected in cached responses, allowing attackers to poison web caches and CDNs with malicious content that is then served to all users, potentially enabling widespread defacement or malware distribution.',
|
|
154
|
+
severity: 'high',
|
|
155
|
+
category: 'configuration',
|
|
156
|
+
scanner: 'host-header',
|
|
157
|
+
cvss: {
|
|
158
|
+
score: 6.5,
|
|
159
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N',
|
|
160
|
+
severity: 'MEDIUM',
|
|
161
|
+
},
|
|
162
|
+
cwe: [
|
|
163
|
+
{ id: 'CWE-644', name: 'Improper Neutralization of HTTP Headers', url: 'https://cwe.mitre.org/data/definitions/644.html' },
|
|
164
|
+
],
|
|
165
|
+
owasp: [
|
|
166
|
+
{ id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
|
|
167
|
+
],
|
|
168
|
+
remediation: 'Configure web servers to reject requests with unexpected Host headers. Include Host header in cache keys. Use canonical URLs for all generated links.',
|
|
169
|
+
},
|
|
170
|
+
|
|
171
|
+
[VulnerabilityCode.HOST_PASSWORD_RESET]: {
|
|
172
|
+
id: 53,
|
|
173
|
+
code: VulnerabilityCode.HOST_PASSWORD_RESET,
|
|
174
|
+
title: 'Host Header Injection - Password Reset Poisoning',
|
|
175
|
+
description: 'Critical host header injection vulnerability in password reset functionality where the injected Host header is used to generate password reset URLs, allowing attackers to receive password reset tokens when victims click the manipulated links in legitimate reset emails.',
|
|
176
|
+
severity: 'high',
|
|
177
|
+
category: 'configuration',
|
|
178
|
+
scanner: 'host-header',
|
|
179
|
+
cvss: {
|
|
180
|
+
score: 7.5,
|
|
181
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N',
|
|
182
|
+
severity: 'HIGH',
|
|
183
|
+
},
|
|
184
|
+
cwe: [
|
|
185
|
+
{ id: 'CWE-644', name: 'Improper Neutralization of HTTP Headers', url: 'https://cwe.mitre.org/data/definitions/644.html' },
|
|
186
|
+
],
|
|
187
|
+
owasp: [
|
|
188
|
+
{ id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
|
|
189
|
+
],
|
|
190
|
+
remediation: 'Use hardcoded canonical domain for generated URLs. Never trust Host header for security-sensitive functionality. Validate Host header against configured allowed hosts.',
|
|
191
|
+
},
|
|
192
|
+
|
|
193
|
+
[VulnerabilityCode.SSRF_FILTER_BYPASS]: {
|
|
194
|
+
id: 54,
|
|
195
|
+
code: VulnerabilityCode.SSRF_FILTER_BYPASS,
|
|
196
|
+
title: 'Server-Side Request Forgery - Filter Bypass',
|
|
197
|
+
description: 'SSRF vulnerability that bypasses security filters through encoding tricks (URL encoding, IPv6 representation, decimal IP notation), DNS rebinding, or using alternative representations of blocked addresses to reach internal resources despite URL validation controls.',
|
|
198
|
+
severity: 'high',
|
|
199
|
+
category: 'ssrf',
|
|
200
|
+
scanner: 'ssrf',
|
|
201
|
+
cvss: {
|
|
202
|
+
score: 7.5,
|
|
203
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N',
|
|
204
|
+
severity: 'HIGH',
|
|
205
|
+
},
|
|
206
|
+
cwe: [
|
|
207
|
+
{ id: 'CWE-918', name: 'SSRF', url: 'https://cwe.mitre.org/data/definitions/918.html' },
|
|
208
|
+
],
|
|
209
|
+
owasp: [
|
|
210
|
+
{ id: 'A10:2021', name: 'SSRF', url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/' },
|
|
211
|
+
],
|
|
212
|
+
remediation: 'Implement defense-in-depth with multiple validation layers. Resolve DNS before validation. Use strict URL parsing libraries. Block all private IP ranges including encoded forms.',
|
|
213
|
+
},
|
|
214
|
+
|
|
215
|
+
[VulnerabilityCode.REDIRECT_META_REFRESH]: {
|
|
216
|
+
id: 55,
|
|
217
|
+
code: VulnerabilityCode.REDIRECT_META_REFRESH,
|
|
218
|
+
title: 'Open Redirect - Meta Refresh',
|
|
219
|
+
description: 'Open redirect vulnerability through HTML meta refresh tags where user input controls the redirect target URL, enabling phishing attacks by sending victims to malicious sites after a brief delay on the legitimate domain, bypassing some security controls.',
|
|
220
|
+
severity: 'low',
|
|
221
|
+
category: 'business_logic',
|
|
222
|
+
scanner: 'redirect-route',
|
|
223
|
+
cvss: {
|
|
224
|
+
score: 4.3,
|
|
225
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
226
|
+
severity: 'MEDIUM',
|
|
227
|
+
},
|
|
228
|
+
cwe: [
|
|
229
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
230
|
+
],
|
|
231
|
+
owasp: [
|
|
232
|
+
{ id: 'A01:2021', name: 'Broken Access Control', url: 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/' },
|
|
233
|
+
],
|
|
234
|
+
remediation: 'Validate meta refresh URLs against allowlist. Avoid using user input in meta refresh tags. Prefer server-side redirects with proper validation over client-side meta refresh.',
|
|
235
|
+
},
|
|
236
|
+
|
|
237
|
+
[VulnerabilityCode.HOST_REDIRECT]: {
|
|
238
|
+
id: 56,
|
|
239
|
+
code: VulnerabilityCode.HOST_REDIRECT,
|
|
240
|
+
title: 'Host Header Injection - Open Redirect',
|
|
241
|
+
description: 'Host header injection leading to open redirect where the application uses the Host header to generate redirect URLs, allowing attackers to redirect users to malicious domains by manipulating the Host header in their requests.',
|
|
242
|
+
severity: 'medium',
|
|
243
|
+
category: 'configuration',
|
|
244
|
+
scanner: 'host-header',
|
|
245
|
+
cvss: {
|
|
246
|
+
score: 5.3,
|
|
247
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
|
|
248
|
+
severity: 'MEDIUM',
|
|
249
|
+
},
|
|
250
|
+
cwe: [
|
|
251
|
+
{ id: 'CWE-644', name: 'Improper Neutralization of HTTP Headers', url: 'https://cwe.mitre.org/data/definitions/644.html' },
|
|
252
|
+
{ id: 'CWE-601', name: 'URL Redirection', url: 'https://cwe.mitre.org/data/definitions/601.html' },
|
|
253
|
+
],
|
|
254
|
+
owasp: [
|
|
255
|
+
{ id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
|
|
256
|
+
],
|
|
257
|
+
remediation: 'Configure web server to validate Host header. Use hardcoded domain for redirect URLs. Implement allowlist for accepted Host header values.',
|
|
258
|
+
},
|
|
259
|
+
};
|
|
260
|
+
|
|
261
|
+
export default SSRF_VULNERABILITIES;
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vulnerability Registry - XSS Vulnerabilities
|
|
3
|
+
*
|
|
4
|
+
* Definitions for all Cross-Site Scripting vulnerability types
|
|
5
|
+
*/
|
|
6
|
+
import type { VulnerabilityDefinition } from '../types.js';
|
|
7
|
+
export declare const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition>;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"xss.d.ts","sourceRoot":"","sources":["xss.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAGH,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,aAAa,CAAC;AAE3D,eAAO,MAAM,mBAAmB,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CA4UvE,CAAC"}
|