@zerothreatai/vulnerability-registry 2.0.0 → 4.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +17 -0
- package/dist/categories/configuration.js +501 -0
- package/dist/categories/injection.js +34 -0
- package/dist/categories/sensitive-paths.js +84 -0
- package/dist/categories/ssrf.js +11 -0
- package/dist/categories/xss.js +15 -0
- package/dist/category.d.ts +6 -0
- package/dist/category.js +15 -0
- package/dist/error-codes.d.ts +20 -0
- package/dist/error-codes.js +20 -0
- package/dist/index.d.ts +9 -1
- package/dist/index.js +5 -1
- package/dist/scanner.d.ts +6 -0
- package/dist/scanner.js +22 -0
- package/dist/types.d.ts +2 -0
- package/dist-cjs/categories/authentication.js +17 -0
- package/dist-cjs/categories/configuration.js +501 -0
- package/dist-cjs/categories/injection.js +34 -0
- package/dist-cjs/categories/sensitive-paths.js +84 -0
- package/dist-cjs/categories/ssrf.js +11 -0
- package/dist-cjs/categories/xss.js +15 -0
- package/dist-cjs/category.js +18 -0
- package/dist-cjs/error-codes.js +20 -0
- package/dist-cjs/index.js +7 -1
- package/dist-cjs/scanner.js +25 -0
- package/package.json +1 -1
- package/src/categories/authentication.js +54 -40
- package/src/categories/authentication.ts +134 -117
- package/src/categories/configuration.js +990 -114
- package/src/categories/configuration.ts +1625 -1104
- package/src/categories/injection.js +105 -74
- package/src/categories/injection.ts +129 -95
- package/src/categories/sensitive-paths.js +255 -174
- package/src/categories/sensitive-paths.ts +84 -0
- package/src/categories/ssrf.js +36 -28
- package/src/categories/ssrf.ts +11 -0
- package/src/categories/xss.js +47 -35
- package/src/categories/xss.ts +15 -0
- package/src/category.ts +16 -0
- package/src/error-codes.d.ts +38 -0
- package/src/error-codes.js +41 -6
- package/src/error-codes.ts +25 -5
- package/src/index.js +33 -48
- package/src/index.ts +20 -14
- package/src/scanner.ts +23 -0
- package/src/types.d.ts +2 -0
- package/src/types.js +1 -2
- package/src/types.ts +4 -2
- package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
|
@@ -17,6 +17,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
17
17
|
title: 'SQL Injection - Error Based',
|
|
18
18
|
description: 'Error-based SQL injection vulnerability detected where database error messages are reflected in the application response, allowing attackers to extract sensitive data from the database by manipulating SQL queries and analyzing error output.',
|
|
19
19
|
severity: 'high',
|
|
20
|
+
levelId: 2,
|
|
20
21
|
category: 'injection',
|
|
21
22
|
scanner: 'sql-injection',
|
|
22
23
|
cvss: {
|
|
@@ -39,6 +40,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
39
40
|
title: 'SQL Injection - Boolean Based Blind',
|
|
40
41
|
description: 'Boolean-based blind SQL injection vulnerability where the application responds differently based on whether injected conditions evaluate to true or false, enabling attackers to infer database contents one bit at a time through systematic query manipulation.',
|
|
41
42
|
severity: 'high',
|
|
43
|
+
levelId: 2,
|
|
42
44
|
category: 'injection',
|
|
43
45
|
scanner: 'sql-injection',
|
|
44
46
|
cvss: {
|
|
@@ -61,6 +63,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
61
63
|
title: 'SQL Injection - Time Based Blind',
|
|
62
64
|
description: 'Time-based blind SQL injection vulnerability where attackers can infer database contents by measuring response time differences caused by injected time delay functions like SLEEP() or WAITFOR, enabling complete database extraction through timing analysis.',
|
|
63
65
|
severity: 'high',
|
|
66
|
+
levelId: 2,
|
|
64
67
|
category: 'injection',
|
|
65
68
|
scanner: 'sql-injection',
|
|
66
69
|
cvss: {
|
|
@@ -83,6 +86,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
83
86
|
title: 'SQL Injection - Stacked Queries',
|
|
84
87
|
description: 'Critical stacked queries SQL injection vulnerability allowing attackers to execute multiple SQL statements in a single query, enabling destructive operations like DROP TABLE, INSERT into admin tables, or creating backdoor accounts with full database control.',
|
|
85
88
|
severity: 'critical',
|
|
89
|
+
levelId: 1,
|
|
86
90
|
category: 'injection',
|
|
87
91
|
scanner: 'sql-injection',
|
|
88
92
|
cvss: {
|
|
@@ -105,6 +109,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
105
109
|
title: 'SQL Injection - UNION Based',
|
|
106
110
|
description: 'UNION-based SQL injection vulnerability allowing attackers to append additional SELECT queries using UNION operator, enabling direct extraction of data from other database tables including user credentials, personal information, and sensitive business data.',
|
|
107
111
|
severity: 'high',
|
|
112
|
+
levelId: 2,
|
|
108
113
|
category: 'injection',
|
|
109
114
|
scanner: 'sql-injection',
|
|
110
115
|
cvss: {
|
|
@@ -130,6 +135,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
130
135
|
title: 'OS Command Injection - OOB Confirmed',
|
|
131
136
|
description: 'Critical OS command injection vulnerability confirmed through out-of-band callback detection, proving that attacker-controlled shell commands are being executed on the server operating system with full access to system resources and potential for complete server compromise.',
|
|
132
137
|
severity: 'critical',
|
|
138
|
+
levelId: 1,
|
|
133
139
|
category: 'injection',
|
|
134
140
|
scanner: 'command-injection',
|
|
135
141
|
cvss: {
|
|
@@ -152,6 +158,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
152
158
|
title: 'OS Command Injection - Reflected Output',
|
|
153
159
|
description: 'OS command injection vulnerability confirmed by command output being reflected in the application response, indicating that shell commands execute on the server and their results are returned to the attacker for data exfiltration and system reconnaissance.',
|
|
154
160
|
severity: 'critical',
|
|
161
|
+
levelId: 1,
|
|
155
162
|
category: 'injection',
|
|
156
163
|
scanner: 'command-injection',
|
|
157
164
|
cvss: {
|
|
@@ -174,6 +181,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
174
181
|
title: 'OS Command Injection - Time Based',
|
|
175
182
|
description: 'Time-based OS command injection vulnerability detected through measurable response time delays caused by injected sleep or ping commands, strongly indicating that shell commands execute on the server even though output is not directly visible in responses.',
|
|
176
183
|
severity: 'high',
|
|
184
|
+
levelId: 2,
|
|
177
185
|
category: 'injection',
|
|
178
186
|
scanner: 'command-injection',
|
|
179
187
|
cvss: {
|
|
@@ -196,6 +204,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
196
204
|
title: 'OS Command Injection - Error Based',
|
|
197
205
|
description: 'Potential OS command injection vulnerability indicated by distinctive error messages or system-level exceptions in the application response when malformed shell payloads are submitted, suggesting command execution attempts reach the operating system interpreter.',
|
|
198
206
|
severity: 'medium',
|
|
207
|
+
levelId: 3,
|
|
199
208
|
category: 'injection',
|
|
200
209
|
scanner: 'command-injection',
|
|
201
210
|
cvss: {
|
|
@@ -221,6 +230,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
221
230
|
title: 'Server-Side Template Injection - Jinja2',
|
|
222
231
|
description: 'Critical server-side template injection vulnerability in Jinja2 (Python/Flask) where user input is processed as template code, enabling attackers to execute arbitrary Python code on the server through template expressions like {{config}} or {{request.application.__globals__}}.',
|
|
223
232
|
severity: 'critical',
|
|
233
|
+
levelId: 1,
|
|
224
234
|
category: 'injection',
|
|
225
235
|
scanner: 'ssti',
|
|
226
236
|
cvss: {
|
|
@@ -243,6 +253,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
243
253
|
title: 'Server-Side Template Injection - Twig',
|
|
244
254
|
description: 'Critical server-side template injection vulnerability in Twig (PHP/Symfony) where user input is evaluated as template expressions, allowing attackers to execute arbitrary PHP code on the server through filter chains and object method invocations within template syntax.',
|
|
245
255
|
severity: 'critical',
|
|
256
|
+
levelId: 1,
|
|
246
257
|
category: 'injection',
|
|
247
258
|
scanner: 'ssti',
|
|
248
259
|
cvss: {
|
|
@@ -265,6 +276,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
265
276
|
title: 'Server-Side Template Injection - FreeMarker',
|
|
266
277
|
description: 'Critical server-side template injection vulnerability in FreeMarker (Java) where user-controlled data is interpreted as template directives, enabling remote code execution through Java class instantiation and method invocation via FreeMarker built-in expressions.',
|
|
267
278
|
severity: 'critical',
|
|
279
|
+
levelId: 1,
|
|
268
280
|
category: 'injection',
|
|
269
281
|
scanner: 'ssti',
|
|
270
282
|
cvss: {
|
|
@@ -287,6 +299,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
287
299
|
title: 'Server-Side Template Injection - Generic',
|
|
288
300
|
description: 'Server-side template injection vulnerability detected where user input is being processed by a template engine, potentially allowing code execution. The specific template engine could not be determined, but mathematical expression evaluation confirms server-side processing of user input.',
|
|
289
301
|
severity: 'high',
|
|
302
|
+
levelId: 2,
|
|
290
303
|
category: 'injection',
|
|
291
304
|
scanner: 'ssti',
|
|
292
305
|
cvss: {
|
|
@@ -309,6 +322,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
309
322
|
title: 'Server-Side Template Injection - Velocity',
|
|
310
323
|
description: 'Critical server-side template injection vulnerability in Apache Velocity (Java) where user-controlled data is processed as template directives, enabling arbitrary Java code execution through Velocity Template Language expressions and class instantiation.',
|
|
311
324
|
severity: 'critical',
|
|
325
|
+
levelId: 1,
|
|
312
326
|
category: 'injection',
|
|
313
327
|
scanner: 'ssti',
|
|
314
328
|
cvss: {
|
|
@@ -331,6 +345,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
331
345
|
title: 'Server-Side Template Injection - Thymeleaf',
|
|
332
346
|
description: 'Critical server-side template injection vulnerability in Thymeleaf (Spring/Java) where user input is processed as template expressions, enabling remote code execution through SpEL (Spring Expression Language) injection in template attributes.',
|
|
333
347
|
severity: 'critical',
|
|
348
|
+
levelId: 1,
|
|
334
349
|
category: 'injection',
|
|
335
350
|
scanner: 'ssti',
|
|
336
351
|
cvss: {
|
|
@@ -353,6 +368,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
353
368
|
title: 'Server-Side Template Injection - ERB',
|
|
354
369
|
description: 'Critical server-side template injection vulnerability in ERB (Ruby on Rails) where user input is embedded in ERB templates and executed as Ruby code, enabling arbitrary system command execution and complete server compromise through Ruby runtime access.',
|
|
355
370
|
severity: 'critical',
|
|
371
|
+
levelId: 1,
|
|
356
372
|
category: 'injection',
|
|
357
373
|
scanner: 'ssti',
|
|
358
374
|
cvss: {
|
|
@@ -375,6 +391,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
375
391
|
title: 'Server-Side Template Injection - EJS',
|
|
376
392
|
description: 'Critical server-side template injection vulnerability in EJS (Node.js) where user-controlled data is processed as template code, allowing arbitrary JavaScript execution on the server through embedded JavaScript expressions and access to Node.js runtime.',
|
|
377
393
|
severity: 'critical',
|
|
394
|
+
levelId: 1,
|
|
378
395
|
category: 'injection',
|
|
379
396
|
scanner: 'ssti',
|
|
380
397
|
cvss: {
|
|
@@ -397,6 +414,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
397
414
|
title: 'Server-Side Template Injection - Pug/Jade',
|
|
398
415
|
description: 'Critical server-side template injection vulnerability in Pug (formerly Jade, Node.js) where user input is interpreted as template syntax, enabling arbitrary JavaScript code execution through Pug embedded code blocks and access to server-side Node.js environment.',
|
|
399
416
|
severity: 'critical',
|
|
417
|
+
levelId: 1,
|
|
400
418
|
category: 'injection',
|
|
401
419
|
scanner: 'ssti',
|
|
402
420
|
cvss: {
|
|
@@ -419,6 +437,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
419
437
|
title: 'Server-Side Template Injection - Smarty',
|
|
420
438
|
description: 'Critical server-side template injection vulnerability in Smarty (PHP) where user input is processed as template code, enabling arbitrary PHP code execution through Smarty tags and function calls that can lead to complete server compromise.',
|
|
421
439
|
severity: 'critical',
|
|
440
|
+
levelId: 1,
|
|
422
441
|
category: 'injection',
|
|
423
442
|
scanner: 'ssti',
|
|
424
443
|
cvss: {
|
|
@@ -441,6 +460,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
441
460
|
title: 'Server-Side Template Injection - Mako',
|
|
442
461
|
description: 'Critical server-side template injection vulnerability in Mako (Python) where user-controlled data is executed as template code, enabling arbitrary Python code execution through Mako expressions and full access to the Python runtime environment.',
|
|
443
462
|
severity: 'critical',
|
|
463
|
+
levelId: 1,
|
|
444
464
|
category: 'injection',
|
|
445
465
|
scanner: 'ssti',
|
|
446
466
|
cvss: {
|
|
@@ -466,6 +486,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
466
486
|
title: 'XML External Entity Injection - Error Based',
|
|
467
487
|
description: 'Error-based XXE vulnerability where file contents can be extracted through parser error messages by crafting malformed external entities that include file data in error output, enabling data exfiltration even when direct output is not reflected.',
|
|
468
488
|
severity: 'high',
|
|
489
|
+
levelId: 2,
|
|
469
490
|
category: 'injection',
|
|
470
491
|
scanner: 'xxe',
|
|
471
492
|
cvss: {
|
|
@@ -488,6 +509,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
488
509
|
title: 'XML External Entity Injection - Parameter Entity',
|
|
489
510
|
description: 'XXE vulnerability exploiting parameter entities in DTD declarations to exfiltrate data or perform SSRF attacks when regular external entities are blocked, by using percent-encoded entity references within the document type definition.',
|
|
490
511
|
severity: 'high',
|
|
512
|
+
levelId: 2,
|
|
491
513
|
category: 'injection',
|
|
492
514
|
scanner: 'xxe',
|
|
493
515
|
cvss: {
|
|
@@ -513,6 +535,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
513
535
|
title: 'Local File Inclusion - Filter Bypass',
|
|
514
536
|
description: 'Local file inclusion vulnerability that bypasses input validation filters through encoding tricks (URL encoding, double encoding, null bytes), alternate path separators, or case manipulation to access files despite security controls.',
|
|
515
537
|
severity: 'high',
|
|
538
|
+
levelId: 2,
|
|
516
539
|
category: 'file_inclusion',
|
|
517
540
|
scanner: 'local-file-inclusion',
|
|
518
541
|
cvss: {
|
|
@@ -535,6 +558,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
535
558
|
title: 'Local File Inclusion - Process Information Disclosure',
|
|
536
559
|
description: 'LFI vulnerability enabling access to /proc filesystem on Linux systems, exposing process memory maps, environment variables with credentials, command line arguments, and other runtime information that can reveal secrets and aid further attacks.',
|
|
537
560
|
severity: 'high',
|
|
561
|
+
levelId: 2,
|
|
538
562
|
category: 'file_inclusion',
|
|
539
563
|
scanner: 'local-file-inclusion',
|
|
540
564
|
cvss: {
|
|
@@ -560,6 +584,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
560
584
|
title: 'XML External Entity Injection - Classic',
|
|
561
585
|
description: 'Classic XXE vulnerability where external XML entities are processed by the parser, allowing attackers to read local files like /etc/passwd or application configuration files by defining external entities that reference file:// protocol URIs in the XML document type definition.',
|
|
562
586
|
severity: 'high',
|
|
587
|
+
levelId: 2,
|
|
563
588
|
category: 'injection',
|
|
564
589
|
scanner: 'xxe',
|
|
565
590
|
cvss: {
|
|
@@ -582,6 +607,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
582
607
|
title: 'XML External Entity Injection - Blind',
|
|
583
608
|
description: 'Blind XXE vulnerability where external entities are processed but file contents are not directly returned in the response. Exploitation requires out-of-band techniques like error-based extraction or HTTP callbacks to exfiltrate data from the target server.',
|
|
584
609
|
severity: 'high',
|
|
610
|
+
levelId: 2,
|
|
585
611
|
category: 'injection',
|
|
586
612
|
scanner: 'xxe',
|
|
587
613
|
cvss: {
|
|
@@ -604,6 +630,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
604
630
|
title: 'XML External Entity Injection - Out-of-Band',
|
|
605
631
|
description: 'Critical out-of-band XXE vulnerability confirmed through external HTTP/DNS callbacks, proving the XML parser fetches external resources. This enables data exfiltration through URL parameters and server-side request forgery attacks against internal network resources.',
|
|
606
632
|
severity: 'critical',
|
|
633
|
+
levelId: 1,
|
|
607
634
|
category: 'injection',
|
|
608
635
|
scanner: 'xxe',
|
|
609
636
|
cvss: {
|
|
@@ -630,6 +657,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
630
657
|
title: 'Local File Inclusion - Path Traversal',
|
|
631
658
|
description: 'Path traversal vulnerability allowing attackers to read arbitrary files on the server by manipulating file path parameters with directory traversal sequences like ../ to escape the intended directory and access sensitive system or application configuration files.',
|
|
632
659
|
severity: 'high',
|
|
660
|
+
levelId: 2,
|
|
633
661
|
category: 'file_inclusion',
|
|
634
662
|
scanner: 'local-file-inclusion',
|
|
635
663
|
cvss: {
|
|
@@ -653,6 +681,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
653
681
|
title: 'Local File Inclusion - Source Code Disclosure',
|
|
654
682
|
description: 'Critical source code disclosure vulnerability where application source files can be read through file inclusion, exposing proprietary code, hardcoded credentials, API keys, database connection strings, and security implementation details that facilitate further attacks.',
|
|
655
683
|
severity: 'high',
|
|
684
|
+
levelId: 2,
|
|
656
685
|
category: 'file_inclusion',
|
|
657
686
|
scanner: 'local-file-inclusion',
|
|
658
687
|
cvss: {
|
|
@@ -670,12 +699,13 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
670
699
|
remediation: 'Use allowlist validation for file access. Store source files outside web root. Implement proper access controls on file reading functionality. Remove any debug endpoints that read files.',
|
|
671
700
|
},
|
|
672
701
|
|
|
673
|
-
[VulnerabilityCode.LFI_WRAPPER_PROTOCOL]: {
|
|
674
|
-
id: 30,
|
|
675
|
-
code: VulnerabilityCode.LFI_WRAPPER_PROTOCOL,
|
|
676
|
-
title: 'Local File Inclusion - PHP Wrapper Protocol',
|
|
702
|
+
[VulnerabilityCode.LFI_WRAPPER_PROTOCOL]: {
|
|
703
|
+
id: 30,
|
|
704
|
+
code: VulnerabilityCode.LFI_WRAPPER_PROTOCOL,
|
|
705
|
+
title: 'Local File Inclusion - PHP Wrapper Protocol',
|
|
677
706
|
description: 'PHP wrapper protocol exploitation where filter or data wrappers like php://filter or php://input can be used to read source files as base64, write arbitrary files, or achieve remote code execution through deserialization when phar:// wrapper is enabled.',
|
|
678
707
|
severity: 'critical',
|
|
708
|
+
levelId: 1,
|
|
679
709
|
category: 'file_inclusion',
|
|
680
710
|
scanner: 'local-file-inclusion',
|
|
681
711
|
cvss: {
|
|
@@ -689,97 +719,101 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
689
719
|
owasp: [
|
|
690
720
|
{ id: 'A01:2021', name: 'Broken Access Control', url: 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/' },
|
|
691
721
|
],
|
|
692
|
-
remediation: 'Disable allow_url_include and allow_url_fopen in PHP configuration. Filter and validate all file path inputs. Block protocol wrappers in user input. Use allowlist for file access.',
|
|
693
|
-
},
|
|
694
|
-
|
|
695
|
-
[VulnerabilityCode.XPATH_AUTH_BYPASS]: {
|
|
696
|
-
id: 136,
|
|
697
|
-
code: VulnerabilityCode.XPATH_AUTH_BYPASS,
|
|
698
|
-
title: 'XPath Injection - Authentication Bypass',
|
|
699
|
-
description: 'XPath injection vulnerability where crafted input manipulates XPath queries to bypass authentication or authorization checks, allowing attackers to log in as other users or access protected resources without valid credentials.',
|
|
700
|
-
severity: 'high',
|
|
701
|
-
|
|
702
|
-
|
|
703
|
-
|
|
704
|
-
|
|
705
|
-
|
|
706
|
-
|
|
707
|
-
|
|
708
|
-
|
|
709
|
-
|
|
710
|
-
|
|
711
|
-
|
|
712
|
-
|
|
713
|
-
|
|
714
|
-
|
|
715
|
-
|
|
716
|
-
|
|
717
|
-
|
|
718
|
-
|
|
719
|
-
|
|
720
|
-
|
|
721
|
-
|
|
722
|
-
|
|
723
|
-
|
|
724
|
-
|
|
725
|
-
|
|
726
|
-
|
|
727
|
-
|
|
728
|
-
|
|
729
|
-
|
|
730
|
-
|
|
731
|
-
|
|
732
|
-
|
|
733
|
-
|
|
734
|
-
|
|
735
|
-
|
|
736
|
-
|
|
737
|
-
|
|
738
|
-
|
|
739
|
-
|
|
740
|
-
|
|
741
|
-
|
|
742
|
-
|
|
743
|
-
|
|
744
|
-
|
|
745
|
-
|
|
746
|
-
|
|
747
|
-
|
|
748
|
-
|
|
749
|
-
|
|
750
|
-
|
|
751
|
-
|
|
752
|
-
|
|
753
|
-
|
|
754
|
-
|
|
755
|
-
|
|
756
|
-
{ id: '
|
|
757
|
-
],
|
|
758
|
-
|
|
759
|
-
|
|
760
|
-
|
|
761
|
-
|
|
762
|
-
|
|
763
|
-
|
|
764
|
-
|
|
765
|
-
|
|
766
|
-
|
|
767
|
-
|
|
768
|
-
|
|
769
|
-
|
|
770
|
-
|
|
771
|
-
|
|
772
|
-
|
|
773
|
-
|
|
774
|
-
|
|
775
|
-
|
|
776
|
-
|
|
777
|
-
|
|
778
|
-
|
|
779
|
-
|
|
780
|
-
|
|
781
|
-
|
|
782
|
-
}
|
|
722
|
+
remediation: 'Disable allow_url_include and allow_url_fopen in PHP configuration. Filter and validate all file path inputs. Block protocol wrappers in user input. Use allowlist for file access.',
|
|
723
|
+
},
|
|
724
|
+
|
|
725
|
+
[VulnerabilityCode.XPATH_AUTH_BYPASS]: {
|
|
726
|
+
id: 136,
|
|
727
|
+
code: VulnerabilityCode.XPATH_AUTH_BYPASS,
|
|
728
|
+
title: 'XPath Injection - Authentication Bypass',
|
|
729
|
+
description: 'XPath injection vulnerability where crafted input manipulates XPath queries to bypass authentication or authorization checks, allowing attackers to log in as other users or access protected resources without valid credentials.',
|
|
730
|
+
severity: 'high',
|
|
731
|
+
levelId: 2,
|
|
732
|
+
category: 'injection',
|
|
733
|
+
scanner: 'xpath-injection',
|
|
734
|
+
cvss: {
|
|
735
|
+
score: 8.1,
|
|
736
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N',
|
|
737
|
+
severity: 'HIGH',
|
|
738
|
+
},
|
|
739
|
+
cwe: [
|
|
740
|
+
{ id: 'CWE-643', name: 'Improper Neutralization of XPath Expression', url: 'https://cwe.mitre.org/data/definitions/643.html' },
|
|
741
|
+
],
|
|
742
|
+
owasp: [
|
|
743
|
+
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
744
|
+
],
|
|
745
|
+
remediation: 'Use parameterized XPath queries or safe APIs that separate data from query logic. Validate and constrain user input for XPath contexts. Use allowlists and avoid dynamic XPath string concatenation.',
|
|
746
|
+
},
|
|
747
|
+
|
|
748
|
+
[VulnerabilityCode.XPATH_DATA_EXTRACTION]: {
|
|
749
|
+
id: 137,
|
|
750
|
+
code: VulnerabilityCode.XPATH_DATA_EXTRACTION,
|
|
751
|
+
title: 'XPath Injection - Data Extraction',
|
|
752
|
+
description: 'XPath injection vulnerability that allows attackers to read or enumerate sensitive XML data by manipulating query predicates, leading to disclosure of user data, configuration, or credentials stored in XML-backed systems.',
|
|
753
|
+
severity: 'high',
|
|
754
|
+
levelId: 2,
|
|
755
|
+
category: 'injection',
|
|
756
|
+
scanner: 'xpath-injection',
|
|
757
|
+
cvss: {
|
|
758
|
+
score: 7.5,
|
|
759
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N',
|
|
760
|
+
severity: 'HIGH',
|
|
761
|
+
},
|
|
762
|
+
cwe: [
|
|
763
|
+
{ id: 'CWE-643', name: 'Improper Neutralization of XPath Expression', url: 'https://cwe.mitre.org/data/definitions/643.html' },
|
|
764
|
+
],
|
|
765
|
+
owasp: [
|
|
766
|
+
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
767
|
+
],
|
|
768
|
+
remediation: 'Use safe XPath APIs with variables/bind parameters. Apply strict input validation and encoding for XPath contexts. Restrict accessible XML data and apply least-privilege access controls.',
|
|
769
|
+
},
|
|
770
|
+
|
|
771
|
+
[VulnerabilityCode.XPATH_BLIND]: {
|
|
772
|
+
id: 138,
|
|
773
|
+
code: VulnerabilityCode.XPATH_BLIND,
|
|
774
|
+
title: 'XPath Injection - Blind',
|
|
775
|
+
description: 'Blind XPath injection vulnerability where attackers infer query results through boolean or timing differences, enabling gradual extraction of sensitive XML data despite no direct response output.',
|
|
776
|
+
severity: 'medium',
|
|
777
|
+
levelId: 3,
|
|
778
|
+
category: 'injection',
|
|
779
|
+
scanner: 'xpath-injection',
|
|
780
|
+
cvss: {
|
|
781
|
+
score: 6.1,
|
|
782
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N',
|
|
783
|
+
severity: 'MEDIUM',
|
|
784
|
+
},
|
|
785
|
+
cwe: [
|
|
786
|
+
{ id: 'CWE-643', name: 'Improper Neutralization of XPath Expression', url: 'https://cwe.mitre.org/data/definitions/643.html' },
|
|
787
|
+
],
|
|
788
|
+
owasp: [
|
|
789
|
+
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
790
|
+
],
|
|
791
|
+
remediation: 'Use parameterized XPath queries and input validation. Normalize error and response behaviors to reduce side-channel differences. Apply rate limiting to limit inference attacks.',
|
|
792
|
+
},
|
|
793
|
+
|
|
794
|
+
[VulnerabilityCode.XPATH_ERROR_BASED]: {
|
|
795
|
+
id: 139,
|
|
796
|
+
code: VulnerabilityCode.XPATH_ERROR_BASED,
|
|
797
|
+
title: 'XPath Injection - Error Based',
|
|
798
|
+
description: 'XPath injection vulnerability where malformed input triggers verbose error messages that reveal query structure or XML data, enabling attackers to craft precise XPath exploits or extract sensitive information.',
|
|
799
|
+
severity: 'medium',
|
|
800
|
+
levelId: 3,
|
|
801
|
+
category: 'injection',
|
|
802
|
+
scanner: 'xpath-injection',
|
|
803
|
+
cvss: {
|
|
804
|
+
score: 5.9,
|
|
805
|
+
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
|
|
806
|
+
severity: 'MEDIUM',
|
|
807
|
+
},
|
|
808
|
+
cwe: [
|
|
809
|
+
{ id: 'CWE-643', name: 'Improper Neutralization of XPath Expression', url: 'https://cwe.mitre.org/data/definitions/643.html' },
|
|
810
|
+
],
|
|
811
|
+
owasp: [
|
|
812
|
+
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
813
|
+
],
|
|
814
|
+
remediation: 'Suppress detailed XPath error messages in production. Use safe XPath APIs and validation to prevent injection. Implement centralized error handling with generic responses.',
|
|
815
|
+
},
|
|
816
|
+
};
|
|
783
817
|
|
|
784
818
|
export default INJECTION_VULNERABILITIES;
|
|
785
819
|
|