@zerothreatai/vulnerability-registry 3.0.0 → 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/dist/categories/authentication.js +17 -0
  2. package/dist/categories/configuration.js +501 -0
  3. package/dist/categories/injection.js +34 -0
  4. package/dist/categories/sensitive-paths.js +84 -0
  5. package/dist/categories/ssrf.js +11 -0
  6. package/dist/categories/xss.js +15 -0
  7. package/dist/category.d.ts +6 -0
  8. package/dist/category.js +15 -0
  9. package/dist/error-codes.d.ts +20 -0
  10. package/dist/error-codes.js +20 -0
  11. package/dist/index.d.ts +9 -1
  12. package/dist/index.js +5 -1
  13. package/dist/scanner.d.ts +6 -0
  14. package/dist/scanner.js +22 -0
  15. package/dist/types.d.ts +2 -0
  16. package/dist-cjs/categories/authentication.js +17 -0
  17. package/dist-cjs/categories/configuration.js +501 -0
  18. package/dist-cjs/categories/injection.js +34 -0
  19. package/dist-cjs/categories/sensitive-paths.js +84 -0
  20. package/dist-cjs/categories/ssrf.js +11 -0
  21. package/dist-cjs/categories/xss.js +15 -0
  22. package/dist-cjs/category.js +18 -0
  23. package/dist-cjs/error-codes.js +20 -0
  24. package/dist-cjs/index.js +7 -1
  25. package/dist-cjs/scanner.js +25 -0
  26. package/package.json +1 -1
  27. package/src/categories/authentication.js +54 -40
  28. package/src/categories/authentication.ts +134 -117
  29. package/src/categories/configuration.js +990 -114
  30. package/src/categories/configuration.ts +1625 -1104
  31. package/src/categories/injection.js +105 -74
  32. package/src/categories/injection.ts +129 -95
  33. package/src/categories/sensitive-paths.js +255 -174
  34. package/src/categories/sensitive-paths.ts +84 -0
  35. package/src/categories/ssrf.js +36 -28
  36. package/src/categories/ssrf.ts +11 -0
  37. package/src/categories/xss.js +47 -35
  38. package/src/categories/xss.ts +15 -0
  39. package/src/category.ts +16 -0
  40. package/src/error-codes.d.ts +38 -0
  41. package/src/error-codes.js +41 -6
  42. package/src/error-codes.ts +25 -5
  43. package/src/index.js +33 -48
  44. package/src/index.ts +20 -14
  45. package/src/scanner.ts +23 -0
  46. package/src/types.d.ts +2 -0
  47. package/src/types.js +1 -2
  48. package/src/types.ts +4 -2
  49. package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
@@ -1,19 +1,17 @@
1
- "use strict";
2
1
  /**
3
2
  * Vulnerability Registry - SSRF and Misconfiguration Vulnerabilities
4
3
  *
5
4
  * Definitions for SSRF, Open Redirect, Host Header, and related issues
6
5
  */
7
- Object.defineProperty(exports, "__esModule", { value: true });
8
- exports.SSRF_VULNERABILITIES = void 0;
9
- const error_codes_js_1 = require("../error-codes.js");
10
- exports.SSRF_VULNERABILITIES = {
11
- [error_codes_js_1.VulnerabilityCode.SSRF_CLOUD_METADATA]: {
6
+ import { VulnerabilityCode } from '../error-codes.js';
7
+ export const SSRF_VULNERABILITIES = {
8
+ [VulnerabilityCode.SSRF_CLOUD_METADATA]: {
12
9
  id: 46,
13
- code: error_codes_js_1.VulnerabilityCode.SSRF_CLOUD_METADATA,
10
+ code: VulnerabilityCode.SSRF_CLOUD_METADATA,
14
11
  title: 'Server-Side Request Forgery - Cloud Metadata Access',
15
12
  description: 'Critical SSRF vulnerability enabling access to cloud provider metadata services (AWS IMDSv1, GCP, Azure) which expose sensitive information including IAM credentials, API tokens, and instance configuration that can lead to full cloud account compromise and lateral movement.',
16
13
  severity: 'critical',
14
+ levelId: 1,
17
15
  category: 'ssrf',
18
16
  scanner: 'ssrf',
19
17
  cvss: {
@@ -29,12 +27,13 @@ exports.SSRF_VULNERABILITIES = {
29
27
  ],
30
28
  remediation: 'Block access to cloud metadata IP ranges (169.254.169.254). Implement IMDSv2 which requires tokens. Use allowlist for external URLs. Validate and sanitize all URL inputs.',
31
29
  },
32
- [error_codes_js_1.VulnerabilityCode.SSRF_INTERNAL_SERVICE]: {
30
+ [VulnerabilityCode.SSRF_INTERNAL_SERVICE]: {
33
31
  id: 47,
34
- code: error_codes_js_1.VulnerabilityCode.SSRF_INTERNAL_SERVICE,
32
+ code: VulnerabilityCode.SSRF_INTERNAL_SERVICE,
35
33
  title: 'Server-Side Request Forgery - Internal Service Access',
36
34
  description: 'SSRF vulnerability allowing attackers to access internal network services that should not be reachable from the internet, including databases, admin panels, cache servers, and other infrastructure components protected only by network segmentation without authentication.',
37
35
  severity: 'high',
36
+ levelId: 2,
38
37
  category: 'ssrf',
39
38
  scanner: 'ssrf',
40
39
  cvss: {
@@ -50,12 +49,13 @@ exports.SSRF_VULNERABILITIES = {
50
49
  ],
51
50
  remediation: 'Implement URL allowlist for permitted external resources. Block requests to private IP ranges and localhost. Use network segmentation with proper authentication for internal services.',
52
51
  },
53
- [error_codes_js_1.VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING]: {
52
+ [VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING]: {
54
53
  id: 48,
55
- code: error_codes_js_1.VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING,
54
+ code: VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING,
56
55
  title: 'Server-Side Request Forgery - Protocol Smuggling',
57
56
  description: 'SSRF vulnerability exploiting non-HTTP protocol handlers like file://, gopher://, dict://, or ftp:// to read local files, interact with internal services using raw TCP, or perform attacks that would not be possible through HTTP requests alone, significantly expanding impact scope.',
58
57
  severity: 'high',
58
+ levelId: 2,
59
59
  category: 'ssrf',
60
60
  scanner: 'ssrf',
61
61
  cvss: {
@@ -71,12 +71,13 @@ exports.SSRF_VULNERABILITIES = {
71
71
  ],
72
72
  remediation: 'Enforce HTTP/HTTPS only for outbound requests. Disable or block dangerous protocol handlers at the application and network level. Validate URL schemes against strict allowlist.',
73
73
  },
74
- [error_codes_js_1.VulnerabilityCode.SSRF_BLIND_OOB]: {
74
+ [VulnerabilityCode.SSRF_BLIND_OOB]: {
75
75
  id: 49,
76
- code: error_codes_js_1.VulnerabilityCode.SSRF_BLIND_OOB,
76
+ code: VulnerabilityCode.SSRF_BLIND_OOB,
77
77
  title: 'Server-Side Request Forgery - Blind OOB',
78
78
  description: 'Blind SSRF vulnerability confirmed through out-of-band DNS or HTTP callbacks indicating the server makes requests to attacker-controlled destinations even though responses are not reflected, enabling internal network scanning and data exfiltration through DNS or timing side channels.',
79
79
  severity: 'medium',
80
+ levelId: 3,
80
81
  category: 'ssrf',
81
82
  scanner: 'ssrf',
82
83
  cvss: {
@@ -95,12 +96,13 @@ exports.SSRF_VULNERABILITIES = {
95
96
  // ========================================
96
97
  // OPEN REDIRECT
97
98
  // ========================================
98
- [error_codes_js_1.VulnerabilityCode.REDIRECT_HEADER_INJECTION]: {
99
+ [VulnerabilityCode.REDIRECT_HEADER_INJECTION]: {
99
100
  id: 50,
100
- code: error_codes_js_1.VulnerabilityCode.REDIRECT_HEADER_INJECTION,
101
+ code: VulnerabilityCode.REDIRECT_HEADER_INJECTION,
101
102
  title: 'Open Redirect - HTTP Header Injection',
102
103
  description: 'Open redirect vulnerability through Location header manipulation allowing attackers to redirect victims to malicious websites after authenticating or interacting with the legitimate application, facilitating phishing attacks that abuse user trust in the original domain.',
103
104
  severity: 'medium',
105
+ levelId: 3,
104
106
  category: 'business_logic',
105
107
  scanner: 'redirect-route',
106
108
  cvss: {
@@ -116,12 +118,13 @@ exports.SSRF_VULNERABILITIES = {
116
118
  ],
117
119
  remediation: 'Use allowlist of permitted redirect destinations. Avoid using user input for redirect URLs. If redirects are required, use indirect references or validate against known safe patterns.',
118
120
  },
119
- [error_codes_js_1.VulnerabilityCode.REDIRECT_JS_NAVIGATION]: {
121
+ [VulnerabilityCode.REDIRECT_JS_NAVIGATION]: {
120
122
  id: 51,
121
- code: error_codes_js_1.VulnerabilityCode.REDIRECT_JS_NAVIGATION,
123
+ code: VulnerabilityCode.REDIRECT_JS_NAVIGATION,
122
124
  title: 'Open Redirect - JavaScript Navigation',
123
125
  description: 'Client-side open redirect vulnerability through JavaScript navigation methods like window.location or location.href being set to user-controlled values, allowing attackers to redirect users to malicious sites through specially crafted URLs that bypass server-side validation.',
124
126
  severity: 'medium',
127
+ levelId: 3,
125
128
  category: 'business_logic',
126
129
  scanner: 'redirect-route',
127
130
  cvss: {
@@ -140,12 +143,13 @@ exports.SSRF_VULNERABILITIES = {
140
143
  // ========================================
141
144
  // HOST HEADER INJECTION
142
145
  // ========================================
143
- [error_codes_js_1.VulnerabilityCode.HOST_CACHE_POISONING]: {
146
+ [VulnerabilityCode.HOST_CACHE_POISONING]: {
144
147
  id: 52,
145
- code: error_codes_js_1.VulnerabilityCode.HOST_CACHE_POISONING,
148
+ code: VulnerabilityCode.HOST_CACHE_POISONING,
146
149
  title: 'Host Header Injection - Cache Poisoning',
147
150
  description: 'Host header injection vulnerability where manipulated Host headers are reflected in cached responses, allowing attackers to poison web caches and CDNs with malicious content that is then served to all users, potentially enabling widespread defacement or malware distribution.',
148
151
  severity: 'high',
152
+ levelId: 2,
149
153
  category: 'configuration',
150
154
  scanner: 'host-header',
151
155
  cvss: {
@@ -161,12 +165,13 @@ exports.SSRF_VULNERABILITIES = {
161
165
  ],
162
166
  remediation: 'Configure web servers to reject requests with unexpected Host headers. Include Host header in cache keys. Use canonical URLs for all generated links.',
163
167
  },
164
- [error_codes_js_1.VulnerabilityCode.HOST_PASSWORD_RESET]: {
168
+ [VulnerabilityCode.HOST_PASSWORD_RESET]: {
165
169
  id: 53,
166
- code: error_codes_js_1.VulnerabilityCode.HOST_PASSWORD_RESET,
170
+ code: VulnerabilityCode.HOST_PASSWORD_RESET,
167
171
  title: 'Host Header Injection - Password Reset Poisoning',
168
172
  description: 'Critical host header injection vulnerability in password reset functionality where the injected Host header is used to generate password reset URLs, allowing attackers to receive password reset tokens when victims click the manipulated links in legitimate reset emails.',
169
173
  severity: 'high',
174
+ levelId: 2,
170
175
  category: 'configuration',
171
176
  scanner: 'host-header',
172
177
  cvss: {
@@ -182,12 +187,13 @@ exports.SSRF_VULNERABILITIES = {
182
187
  ],
183
188
  remediation: 'Use hardcoded canonical domain for generated URLs. Never trust Host header for security-sensitive functionality. Validate Host header against configured allowed hosts.',
184
189
  },
185
- [error_codes_js_1.VulnerabilityCode.SSRF_FILTER_BYPASS]: {
190
+ [VulnerabilityCode.SSRF_FILTER_BYPASS]: {
186
191
  id: 54,
187
- code: error_codes_js_1.VulnerabilityCode.SSRF_FILTER_BYPASS,
192
+ code: VulnerabilityCode.SSRF_FILTER_BYPASS,
188
193
  title: 'Server-Side Request Forgery - Filter Bypass',
189
194
  description: 'SSRF vulnerability that bypasses security filters through encoding tricks (URL encoding, IPv6 representation, decimal IP notation), DNS rebinding, or using alternative representations of blocked addresses to reach internal resources despite URL validation controls.',
190
195
  severity: 'high',
196
+ levelId: 2,
191
197
  category: 'ssrf',
192
198
  scanner: 'ssrf',
193
199
  cvss: {
@@ -203,12 +209,13 @@ exports.SSRF_VULNERABILITIES = {
203
209
  ],
204
210
  remediation: 'Implement defense-in-depth with multiple validation layers. Resolve DNS before validation. Use strict URL parsing libraries. Block all private IP ranges including encoded forms.',
205
211
  },
206
- [error_codes_js_1.VulnerabilityCode.REDIRECT_META_REFRESH]: {
212
+ [VulnerabilityCode.REDIRECT_META_REFRESH]: {
207
213
  id: 55,
208
- code: error_codes_js_1.VulnerabilityCode.REDIRECT_META_REFRESH,
214
+ code: VulnerabilityCode.REDIRECT_META_REFRESH,
209
215
  title: 'Open Redirect - Meta Refresh',
210
216
  description: 'Open redirect vulnerability through HTML meta refresh tags where user input controls the redirect target URL, enabling phishing attacks by sending victims to malicious sites after a brief delay on the legitimate domain, bypassing some security controls.',
211
217
  severity: 'low',
218
+ levelId: 4,
212
219
  category: 'business_logic',
213
220
  scanner: 'redirect-route',
214
221
  cvss: {
@@ -224,12 +231,13 @@ exports.SSRF_VULNERABILITIES = {
224
231
  ],
225
232
  remediation: 'Validate meta refresh URLs against allowlist. Avoid using user input in meta refresh tags. Prefer server-side redirects with proper validation over client-side meta refresh.',
226
233
  },
227
- [error_codes_js_1.VulnerabilityCode.HOST_REDIRECT]: {
234
+ [VulnerabilityCode.HOST_REDIRECT]: {
228
235
  id: 56,
229
- code: error_codes_js_1.VulnerabilityCode.HOST_REDIRECT,
236
+ code: VulnerabilityCode.HOST_REDIRECT,
230
237
  title: 'Host Header Injection - Open Redirect',
231
238
  description: 'Host header injection leading to open redirect where the application uses the Host header to generate redirect URLs, allowing attackers to redirect users to malicious domains by manipulating the Host header in their requests.',
232
239
  severity: 'medium',
240
+ levelId: 3,
233
241
  category: 'configuration',
234
242
  scanner: 'host-header',
235
243
  cvss: {
@@ -247,4 +255,4 @@ exports.SSRF_VULNERABILITIES = {
247
255
  remediation: 'Configure web server to validate Host header. Use hardcoded domain for redirect URLs. Implement allowlist for accepted Host header values.',
248
256
  },
249
257
  };
250
- exports.default = exports.SSRF_VULNERABILITIES;
258
+ export default SSRF_VULNERABILITIES;
@@ -14,6 +14,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
14
14
  title: 'Server-Side Request Forgery - Cloud Metadata Access',
15
15
  description: 'Critical SSRF vulnerability enabling access to cloud provider metadata services (AWS IMDSv1, GCP, Azure) which expose sensitive information including IAM credentials, API tokens, and instance configuration that can lead to full cloud account compromise and lateral movement.',
16
16
  severity: 'critical',
17
+ levelId: 1,
17
18
  category: 'ssrf',
18
19
  scanner: 'ssrf',
19
20
  cvss: {
@@ -36,6 +37,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
36
37
  title: 'Server-Side Request Forgery - Internal Service Access',
37
38
  description: 'SSRF vulnerability allowing attackers to access internal network services that should not be reachable from the internet, including databases, admin panels, cache servers, and other infrastructure components protected only by network segmentation without authentication.',
38
39
  severity: 'high',
40
+ levelId: 2,
39
41
  category: 'ssrf',
40
42
  scanner: 'ssrf',
41
43
  cvss: {
@@ -58,6 +60,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
58
60
  title: 'Server-Side Request Forgery - Protocol Smuggling',
59
61
  description: 'SSRF vulnerability exploiting non-HTTP protocol handlers like file://, gopher://, dict://, or ftp:// to read local files, interact with internal services using raw TCP, or perform attacks that would not be possible through HTTP requests alone, significantly expanding impact scope.',
60
62
  severity: 'high',
63
+ levelId: 2,
61
64
  category: 'ssrf',
62
65
  scanner: 'ssrf',
63
66
  cvss: {
@@ -80,6 +83,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
80
83
  title: 'Server-Side Request Forgery - Blind OOB',
81
84
  description: 'Blind SSRF vulnerability confirmed through out-of-band DNS or HTTP callbacks indicating the server makes requests to attacker-controlled destinations even though responses are not reflected, enabling internal network scanning and data exfiltration through DNS or timing side channels.',
82
85
  severity: 'medium',
86
+ levelId: 3,
83
87
  category: 'ssrf',
84
88
  scanner: 'ssrf',
85
89
  cvss: {
@@ -105,6 +109,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
105
109
  title: 'Open Redirect - HTTP Header Injection',
106
110
  description: 'Open redirect vulnerability through Location header manipulation allowing attackers to redirect victims to malicious websites after authenticating or interacting with the legitimate application, facilitating phishing attacks that abuse user trust in the original domain.',
107
111
  severity: 'medium',
112
+ levelId: 3,
108
113
  category: 'business_logic',
109
114
  scanner: 'redirect-route',
110
115
  cvss: {
@@ -127,6 +132,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
127
132
  title: 'Open Redirect - JavaScript Navigation',
128
133
  description: 'Client-side open redirect vulnerability through JavaScript navigation methods like window.location or location.href being set to user-controlled values, allowing attackers to redirect users to malicious sites through specially crafted URLs that bypass server-side validation.',
129
134
  severity: 'medium',
135
+ levelId: 3,
130
136
  category: 'business_logic',
131
137
  scanner: 'redirect-route',
132
138
  cvss: {
@@ -152,6 +158,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
152
158
  title: 'Host Header Injection - Cache Poisoning',
153
159
  description: 'Host header injection vulnerability where manipulated Host headers are reflected in cached responses, allowing attackers to poison web caches and CDNs with malicious content that is then served to all users, potentially enabling widespread defacement or malware distribution.',
154
160
  severity: 'high',
161
+ levelId: 2,
155
162
  category: 'configuration',
156
163
  scanner: 'host-header',
157
164
  cvss: {
@@ -174,6 +181,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
174
181
  title: 'Host Header Injection - Password Reset Poisoning',
175
182
  description: 'Critical host header injection vulnerability in password reset functionality where the injected Host header is used to generate password reset URLs, allowing attackers to receive password reset tokens when victims click the manipulated links in legitimate reset emails.',
176
183
  severity: 'high',
184
+ levelId: 2,
177
185
  category: 'configuration',
178
186
  scanner: 'host-header',
179
187
  cvss: {
@@ -196,6 +204,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
196
204
  title: 'Server-Side Request Forgery - Filter Bypass',
197
205
  description: 'SSRF vulnerability that bypasses security filters through encoding tricks (URL encoding, IPv6 representation, decimal IP notation), DNS rebinding, or using alternative representations of blocked addresses to reach internal resources despite URL validation controls.',
198
206
  severity: 'high',
207
+ levelId: 2,
199
208
  category: 'ssrf',
200
209
  scanner: 'ssrf',
201
210
  cvss: {
@@ -218,6 +227,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
218
227
  title: 'Open Redirect - Meta Refresh',
219
228
  description: 'Open redirect vulnerability through HTML meta refresh tags where user input controls the redirect target URL, enabling phishing attacks by sending victims to malicious sites after a brief delay on the legitimate domain, bypassing some security controls.',
220
229
  severity: 'low',
230
+ levelId: 4,
221
231
  category: 'business_logic',
222
232
  scanner: 'redirect-route',
223
233
  cvss: {
@@ -240,6 +250,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
240
250
  title: 'Host Header Injection - Open Redirect',
241
251
  description: 'Host header injection leading to open redirect where the application uses the Host header to generate redirect URLs, allowing attackers to redirect users to malicious domains by manipulating the Host header in their requests.',
242
252
  severity: 'medium',
253
+ levelId: 3,
243
254
  category: 'configuration',
244
255
  scanner: 'host-header',
245
256
  cvss: {
@@ -1,19 +1,17 @@
1
- "use strict";
2
1
  /**
3
2
  * Vulnerability Registry - XSS Vulnerabilities
4
3
  *
5
4
  * Definitions for all Cross-Site Scripting vulnerability types
6
5
  */
7
- Object.defineProperty(exports, "__esModule", { value: true });
8
- exports.XSS_VULNERABILITIES = void 0;
9
- const error_codes_js_1 = require("../error-codes.js");
10
- exports.XSS_VULNERABILITIES = {
11
- [error_codes_js_1.VulnerabilityCode.XSS_REFLECTED]: {
6
+ import { VulnerabilityCode } from '../error-codes.js';
7
+ export const XSS_VULNERABILITIES = {
8
+ [VulnerabilityCode.XSS_REFLECTED]: {
12
9
  id: 31,
13
- code: error_codes_js_1.VulnerabilityCode.XSS_REFLECTED,
10
+ code: VulnerabilityCode.XSS_REFLECTED,
14
11
  title: 'Cross-Site Scripting - Reflected',
15
12
  description: 'Reflected XSS vulnerability where user input is immediately returned by the server in the response without proper encoding, allowing attackers to inject malicious scripts that execute in the victim browser when they click a crafted link or submit a manipulated form.',
16
13
  severity: 'medium',
14
+ levelId: 3,
17
15
  category: 'xss',
18
16
  scanner: 'xss',
19
17
  cvss: {
@@ -29,12 +27,13 @@ exports.XSS_VULNERABILITIES = {
29
27
  ],
30
28
  remediation: 'HTML-encode all user input before rendering in HTML. Implement Content Security Policy (CSP). Use context-aware output encoding based on output location (HTML, JS, CSS, URL).',
31
29
  },
32
- [error_codes_js_1.VulnerabilityCode.XSS_STORED]: {
30
+ [VulnerabilityCode.XSS_STORED]: {
33
31
  id: 32,
34
- code: error_codes_js_1.VulnerabilityCode.XSS_STORED,
32
+ code: VulnerabilityCode.XSS_STORED,
35
33
  title: 'Cross-Site Scripting - Stored',
36
34
  description: 'Critical stored XSS vulnerability where malicious scripts are permanently saved in the application database and served to all users who view the affected content, enabling widespread session hijacking, credential theft, and malware distribution without requiring victim interaction beyond normal usage.',
37
35
  severity: 'high',
36
+ levelId: 2,
38
37
  category: 'xss',
39
38
  scanner: 'xss',
40
39
  cvss: {
@@ -50,12 +49,13 @@ exports.XSS_VULNERABILITIES = {
50
49
  ],
51
50
  remediation: 'Sanitize all user input before storage. HTML-encode all dynamic content in responses. Implement strict Content Security Policy. Use HTTP-only and Secure flags for session cookies.',
52
51
  },
53
- [error_codes_js_1.VulnerabilityCode.XSS_DOM_BASED]: {
52
+ [VulnerabilityCode.XSS_DOM_BASED]: {
54
53
  id: 33,
55
- code: error_codes_js_1.VulnerabilityCode.XSS_DOM_BASED,
54
+ code: VulnerabilityCode.XSS_DOM_BASED,
56
55
  title: 'Cross-Site Scripting - DOM Based',
57
56
  description: 'DOM-based XSS vulnerability where the attack payload is processed entirely in the client-side JavaScript code without being sent to the server, typically through dangerous sinks like innerHTML, document.write(), or eval() that process URL fragments or user-controlled DOM elements.',
58
57
  severity: 'medium',
58
+ levelId: 3,
59
59
  category: 'xss',
60
60
  scanner: 'xss',
61
61
  cvss: {
@@ -71,12 +71,13 @@ exports.XSS_VULNERABILITIES = {
71
71
  ],
72
72
  remediation: 'Avoid using dangerous DOM sinks like innerHTML and document.write(). Use textContent instead of innerHTML. Sanitize any DOM manipulation with user input. Implement Trusted Types if supported.',
73
73
  },
74
- [error_codes_js_1.VulnerabilityCode.XSS_SVG_INJECTION]: {
74
+ [VulnerabilityCode.XSS_SVG_INJECTION]: {
75
75
  id: 34,
76
- code: error_codes_js_1.VulnerabilityCode.XSS_SVG_INJECTION,
76
+ code: VulnerabilityCode.XSS_SVG_INJECTION,
77
77
  title: 'Cross-Site Scripting - SVG Injection',
78
78
  description: 'SVG-based XSS vulnerability where malicious JavaScript is embedded within SVG image files using script elements or event handlers like onload, which execute when the browser renders the SVG file as an image or inline element, bypassing image upload security controls.',
79
79
  severity: 'high',
80
+ levelId: 2,
80
81
  category: 'xss',
81
82
  scanner: 'xss',
82
83
  cvss: {
@@ -92,12 +93,13 @@ exports.XSS_VULNERABILITIES = {
92
93
  ],
93
94
  remediation: 'Sanitize uploaded SVG files to remove script elements and event handlers. Serve user-uploaded SVGs from a separate domain. Set Content-Disposition: attachment for SVG downloads. Use Content-Security-Policy.',
94
95
  },
95
- [error_codes_js_1.VulnerabilityCode.XSS_CSTI_ANGULAR]: {
96
+ [VulnerabilityCode.XSS_CSTI_ANGULAR]: {
96
97
  id: 35,
97
- code: error_codes_js_1.VulnerabilityCode.XSS_CSTI_ANGULAR,
98
+ code: VulnerabilityCode.XSS_CSTI_ANGULAR,
98
99
  title: 'Cross-Site Scripting - Angular Template Injection',
99
100
  description: 'AngularJS client-side template injection vulnerability where user input containing Angular expressions like {{constructor.constructor("alert(1)")()}} is evaluated by the Angular template engine, leading to arbitrary JavaScript execution in the user browser context.',
100
101
  severity: 'high',
102
+ levelId: 2,
101
103
  category: 'xss',
102
104
  scanner: 'xss',
103
105
  cvss: {
@@ -114,12 +116,13 @@ exports.XSS_VULNERABILITIES = {
114
116
  ],
115
117
  remediation: 'Upgrade from AngularJS to modern Angular which is not vulnerable to template injection. Use ng-non-bindable directive for user content. Encode special characters {{}} in user input. Apply strict CSP.',
116
118
  },
117
- [error_codes_js_1.VulnerabilityCode.XSS_CSP_BYPASS]: {
119
+ [VulnerabilityCode.XSS_CSP_BYPASS]: {
118
120
  id: 36,
119
- code: error_codes_js_1.VulnerabilityCode.XSS_CSP_BYPASS,
121
+ code: VulnerabilityCode.XSS_CSP_BYPASS,
120
122
  title: 'Cross-Site Scripting - CSP Bypass',
121
123
  description: 'XSS vulnerability that bypasses Content Security Policy protections through techniques like JSONP endpoints on whitelisted domains, base tag injection, Angular.js libraries on CDN, or other CSP bypass gadgets that allow script execution despite CSP controls being in place.',
122
124
  severity: 'high',
125
+ levelId: 2,
123
126
  category: 'xss',
124
127
  scanner: 'xss',
125
128
  cvss: {
@@ -135,12 +138,13 @@ exports.XSS_VULNERABILITIES = {
135
138
  ],
136
139
  remediation: 'Review CSP for JSONP endpoints and Angular.js CDN inclusions. Use nonce-based CSP instead of allowlist domains. Add base-uri restriction. Fix the underlying XSS vulnerability.',
137
140
  },
138
- [error_codes_js_1.VulnerabilityCode.XSS_JS_CONTEXT]: {
141
+ [VulnerabilityCode.XSS_JS_CONTEXT]: {
139
142
  id: 37,
140
- code: error_codes_js_1.VulnerabilityCode.XSS_JS_CONTEXT,
143
+ code: VulnerabilityCode.XSS_JS_CONTEXT,
141
144
  title: 'Cross-Site Scripting - JavaScript Context',
142
145
  description: 'XSS vulnerability where user input is injected directly into JavaScript code blocks, allowing attackers to break out of string contexts and execute arbitrary JavaScript by injecting quote characters and script code, or modify application logic by injecting new statements.',
143
146
  severity: 'high',
147
+ levelId: 2,
144
148
  category: 'xss',
145
149
  scanner: 'xss',
146
150
  cvss: {
@@ -156,12 +160,13 @@ exports.XSS_VULNERABILITIES = {
156
160
  ],
157
161
  remediation: 'Avoid inserting user data into JavaScript code. Use JSON.stringify() with proper encoding for data passed to JavaScript. Pass data through data attributes and access via DOM APIs instead.',
158
162
  },
159
- [error_codes_js_1.VulnerabilityCode.XSS_EVENT_HANDLER]: {
163
+ [VulnerabilityCode.XSS_EVENT_HANDLER]: {
160
164
  id: 38,
161
- code: error_codes_js_1.VulnerabilityCode.XSS_EVENT_HANDLER,
165
+ code: VulnerabilityCode.XSS_EVENT_HANDLER,
162
166
  title: 'Cross-Site Scripting - Event Handler Injection',
163
167
  description: 'XSS vulnerability through injection into HTML event handler attributes like onclick, onerror, onload, or onmouseover, allowing attackers to execute JavaScript when users interact with or simply view the affected page elements without requiring script tags.',
164
168
  severity: 'high',
169
+ levelId: 2,
165
170
  category: 'xss',
166
171
  scanner: 'xss',
167
172
  cvss: {
@@ -177,12 +182,13 @@ exports.XSS_VULNERABILITIES = {
177
182
  ],
178
183
  remediation: 'Use proper HTML encoding for all user input in attributes. Avoid placing user input in event handler attributes. Use Content Security Policy with unsafe-inline disabled.',
179
184
  },
180
- [error_codes_js_1.VulnerabilityCode.XSS_SCRIPT_INJECTION]: {
185
+ [VulnerabilityCode.XSS_SCRIPT_INJECTION]: {
181
186
  id: 39,
182
- code: error_codes_js_1.VulnerabilityCode.XSS_SCRIPT_INJECTION,
187
+ code: VulnerabilityCode.XSS_SCRIPT_INJECTION,
183
188
  title: 'Cross-Site Scripting - Script Tag Injection',
184
189
  description: 'XSS vulnerability where attackers can inject complete script tags into the HTML response, enabling arbitrary JavaScript execution. This is often the most straightforward XSS exploitation when input is not properly sanitized before rendering.',
185
190
  severity: 'high',
191
+ levelId: 2,
186
192
  category: 'xss',
187
193
  scanner: 'xss',
188
194
  cvss: {
@@ -198,12 +204,13 @@ exports.XSS_VULNERABILITIES = {
198
204
  ],
199
205
  remediation: 'Encode < and > characters in user input. Implement Content Security Policy. Use HTML sanitization libraries that remove script tags. Apply context-aware output encoding.',
200
206
  },
201
- [error_codes_js_1.VulnerabilityCode.XSS_HTML_INJECTION]: {
207
+ [VulnerabilityCode.XSS_HTML_INJECTION]: {
202
208
  id: 40,
203
- code: error_codes_js_1.VulnerabilityCode.XSS_HTML_INJECTION,
209
+ code: VulnerabilityCode.XSS_HTML_INJECTION,
204
210
  title: 'Cross-Site Scripting - HTML Injection',
205
211
  description: 'HTML injection vulnerability where attackers can inject arbitrary HTML elements that modify page structure, enabling phishing attacks through fake login forms, content spoofing, or combination with CSS to overlay malicious content over legitimate page elements.',
206
212
  severity: 'medium',
213
+ levelId: 3,
207
214
  category: 'xss',
208
215
  scanner: 'xss',
209
216
  cvss: {
@@ -219,12 +226,13 @@ exports.XSS_VULNERABILITIES = {
219
226
  ],
220
227
  remediation: 'HTML-encode all user input. Use allowlist-based HTML sanitization if rich text is required. Implement Content Security Policy to restrict form actions and frame sources.',
221
228
  },
222
- [error_codes_js_1.VulnerabilityCode.XSS_ATTRIBUTE_INJECTION]: {
229
+ [VulnerabilityCode.XSS_ATTRIBUTE_INJECTION]: {
223
230
  id: 41,
224
- code: error_codes_js_1.VulnerabilityCode.XSS_ATTRIBUTE_INJECTION,
231
+ code: VulnerabilityCode.XSS_ATTRIBUTE_INJECTION,
225
232
  title: 'Cross-Site Scripting - Attribute Injection',
226
233
  description: 'XSS vulnerability where user input is placed in HTML attributes without proper encoding, allowing attackers to break out of the attribute context and inject new attributes or event handlers by using quote characters and spaces.',
227
234
  severity: 'medium',
235
+ levelId: 3,
228
236
  category: 'xss',
229
237
  scanner: 'xss',
230
238
  cvss: {
@@ -240,12 +248,13 @@ exports.XSS_VULNERABILITIES = {
240
248
  ],
241
249
  remediation: 'HTML-encode quotes (single and double) when placing user input in attributes. Always use quoted attributes. Avoid placing user input in dangerous attributes like href, src, or event handlers.',
242
250
  },
243
- [error_codes_js_1.VulnerabilityCode.XSS_CSS_INJECTION]: {
251
+ [VulnerabilityCode.XSS_CSS_INJECTION]: {
244
252
  id: 42,
245
- code: error_codes_js_1.VulnerabilityCode.XSS_CSS_INJECTION,
253
+ code: VulnerabilityCode.XSS_CSS_INJECTION,
246
254
  title: 'Cross-Site Scripting - CSS Injection',
247
255
  description: 'CSS injection vulnerability where attackers can inject malicious CSS rules to exfiltrate data through CSS selectors and background URLs, modify page appearance for phishing, or in older browsers achieve JavaScript execution through CSS expressions.',
248
256
  severity: 'medium',
257
+ levelId: 3,
249
258
  category: 'xss',
250
259
  scanner: 'xss',
251
260
  cvss: {
@@ -261,12 +270,13 @@ exports.XSS_VULNERABILITIES = {
261
270
  ],
262
271
  remediation: 'Sanitize CSS input to remove url() functions and expression() directives. Use CSS-specific encoding. Implement Content Security Policy with style-src restrictions.',
263
272
  },
264
- [error_codes_js_1.VulnerabilityCode.XSS_TEMPLATE_LITERAL]: {
273
+ [VulnerabilityCode.XSS_TEMPLATE_LITERAL]: {
265
274
  id: 43,
266
- code: error_codes_js_1.VulnerabilityCode.XSS_TEMPLATE_LITERAL,
275
+ code: VulnerabilityCode.XSS_TEMPLATE_LITERAL,
267
276
  title: 'Cross-Site Scripting - Template Literal Injection',
268
277
  description: 'XSS vulnerability through JavaScript template literals (backtick strings) where user input can break out of the template context or inject expressions using ${} syntax, executing arbitrary JavaScript in the client browser context.',
269
278
  severity: 'high',
279
+ levelId: 2,
270
280
  category: 'xss',
271
281
  scanner: 'xss',
272
282
  cvss: {
@@ -282,12 +292,13 @@ exports.XSS_VULNERABILITIES = {
282
292
  ],
283
293
  remediation: 'Avoid placing user input inside template literals. Escape backticks, dollar signs, and braces. Use tagged template functions with proper escaping for user data.',
284
294
  },
285
- [error_codes_js_1.VulnerabilityCode.XSS_MUTATION_BASED]: {
295
+ [VulnerabilityCode.XSS_MUTATION_BASED]: {
286
296
  id: 44,
287
- code: error_codes_js_1.VulnerabilityCode.XSS_MUTATION_BASED,
297
+ code: VulnerabilityCode.XSS_MUTATION_BASED,
288
298
  title: 'Cross-Site Scripting - Mutation XSS',
289
299
  description: 'Mutation-based XSS (mXSS) vulnerability exploiting browser HTML parser quirks and DOM mutations where seemingly safe HTML is transformed into executable script through browser parsing behaviors, bypassing traditional sanitization.',
290
300
  severity: 'high',
301
+ levelId: 2,
291
302
  category: 'xss',
292
303
  scanner: 'xss',
293
304
  cvss: {
@@ -303,12 +314,13 @@ exports.XSS_VULNERABILITIES = {
303
314
  ],
304
315
  remediation: 'Use DOMPurify or similar mXSS-aware sanitizers. Avoid innerHTML with user content. Implement Trusted Types. Stay updated on browser parsing behavior changes.',
305
316
  },
306
- [error_codes_js_1.VulnerabilityCode.XSS_CSTI_VUE]: {
317
+ [VulnerabilityCode.XSS_CSTI_VUE]: {
307
318
  id: 45,
308
- code: error_codes_js_1.VulnerabilityCode.XSS_CSTI_VUE,
319
+ code: VulnerabilityCode.XSS_CSTI_VUE,
309
320
  title: 'Cross-Site Scripting - Vue.js Template Injection',
310
321
  description: 'Vue.js client-side template injection vulnerability where user input containing Vue expression syntax like {{}} or v-bind directives is evaluated by the Vue template compiler, leading to arbitrary JavaScript execution in the browser context.',
311
322
  severity: 'high',
323
+ levelId: 2,
312
324
  category: 'xss',
313
325
  scanner: 'xss',
314
326
  cvss: {
@@ -14,6 +14,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
14
14
  title: 'Cross-Site Scripting - Reflected',
15
15
  description: 'Reflected XSS vulnerability where user input is immediately returned by the server in the response without proper encoding, allowing attackers to inject malicious scripts that execute in the victim browser when they click a crafted link or submit a manipulated form.',
16
16
  severity: 'medium',
17
+ levelId: 3,
17
18
  category: 'xss',
18
19
  scanner: 'xss',
19
20
  cvss: {
@@ -36,6 +37,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
36
37
  title: 'Cross-Site Scripting - Stored',
37
38
  description: 'Critical stored XSS vulnerability where malicious scripts are permanently saved in the application database and served to all users who view the affected content, enabling widespread session hijacking, credential theft, and malware distribution without requiring victim interaction beyond normal usage.',
38
39
  severity: 'high',
40
+ levelId: 2,
39
41
  category: 'xss',
40
42
  scanner: 'xss',
41
43
  cvss: {
@@ -58,6 +60,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
58
60
  title: 'Cross-Site Scripting - DOM Based',
59
61
  description: 'DOM-based XSS vulnerability where the attack payload is processed entirely in the client-side JavaScript code without being sent to the server, typically through dangerous sinks like innerHTML, document.write(), or eval() that process URL fragments or user-controlled DOM elements.',
60
62
  severity: 'medium',
63
+ levelId: 3,
61
64
  category: 'xss',
62
65
  scanner: 'xss',
63
66
  cvss: {
@@ -80,6 +83,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
80
83
  title: 'Cross-Site Scripting - SVG Injection',
81
84
  description: 'SVG-based XSS vulnerability where malicious JavaScript is embedded within SVG image files using script elements or event handlers like onload, which execute when the browser renders the SVG file as an image or inline element, bypassing image upload security controls.',
82
85
  severity: 'high',
86
+ levelId: 2,
83
87
  category: 'xss',
84
88
  scanner: 'xss',
85
89
  cvss: {
@@ -102,6 +106,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
102
106
  title: 'Cross-Site Scripting - Angular Template Injection',
103
107
  description: 'AngularJS client-side template injection vulnerability where user input containing Angular expressions like {{constructor.constructor("alert(1)")()}} is evaluated by the Angular template engine, leading to arbitrary JavaScript execution in the user browser context.',
104
108
  severity: 'high',
109
+ levelId: 2,
105
110
  category: 'xss',
106
111
  scanner: 'xss',
107
112
  cvss: {
@@ -125,6 +130,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
125
130
  title: 'Cross-Site Scripting - CSP Bypass',
126
131
  description: 'XSS vulnerability that bypasses Content Security Policy protections through techniques like JSONP endpoints on whitelisted domains, base tag injection, Angular.js libraries on CDN, or other CSP bypass gadgets that allow script execution despite CSP controls being in place.',
127
132
  severity: 'high',
133
+ levelId: 2,
128
134
  category: 'xss',
129
135
  scanner: 'xss',
130
136
  cvss: {
@@ -147,6 +153,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
147
153
  title: 'Cross-Site Scripting - JavaScript Context',
148
154
  description: 'XSS vulnerability where user input is injected directly into JavaScript code blocks, allowing attackers to break out of string contexts and execute arbitrary JavaScript by injecting quote characters and script code, or modify application logic by injecting new statements.',
149
155
  severity: 'high',
156
+ levelId: 2,
150
157
  category: 'xss',
151
158
  scanner: 'xss',
152
159
  cvss: {
@@ -169,6 +176,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
169
176
  title: 'Cross-Site Scripting - Event Handler Injection',
170
177
  description: 'XSS vulnerability through injection into HTML event handler attributes like onclick, onerror, onload, or onmouseover, allowing attackers to execute JavaScript when users interact with or simply view the affected page elements without requiring script tags.',
171
178
  severity: 'high',
179
+ levelId: 2,
172
180
  category: 'xss',
173
181
  scanner: 'xss',
174
182
  cvss: {
@@ -191,6 +199,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
191
199
  title: 'Cross-Site Scripting - Script Tag Injection',
192
200
  description: 'XSS vulnerability where attackers can inject complete script tags into the HTML response, enabling arbitrary JavaScript execution. This is often the most straightforward XSS exploitation when input is not properly sanitized before rendering.',
193
201
  severity: 'high',
202
+ levelId: 2,
194
203
  category: 'xss',
195
204
  scanner: 'xss',
196
205
  cvss: {
@@ -213,6 +222,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
213
222
  title: 'Cross-Site Scripting - HTML Injection',
214
223
  description: 'HTML injection vulnerability where attackers can inject arbitrary HTML elements that modify page structure, enabling phishing attacks through fake login forms, content spoofing, or combination with CSS to overlay malicious content over legitimate page elements.',
215
224
  severity: 'medium',
225
+ levelId: 3,
216
226
  category: 'xss',
217
227
  scanner: 'xss',
218
228
  cvss: {
@@ -235,6 +245,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
235
245
  title: 'Cross-Site Scripting - Attribute Injection',
236
246
  description: 'XSS vulnerability where user input is placed in HTML attributes without proper encoding, allowing attackers to break out of the attribute context and inject new attributes or event handlers by using quote characters and spaces.',
237
247
  severity: 'medium',
248
+ levelId: 3,
238
249
  category: 'xss',
239
250
  scanner: 'xss',
240
251
  cvss: {
@@ -257,6 +268,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
257
268
  title: 'Cross-Site Scripting - CSS Injection',
258
269
  description: 'CSS injection vulnerability where attackers can inject malicious CSS rules to exfiltrate data through CSS selectors and background URLs, modify page appearance for phishing, or in older browsers achieve JavaScript execution through CSS expressions.',
259
270
  severity: 'medium',
271
+ levelId: 3,
260
272
  category: 'xss',
261
273
  scanner: 'xss',
262
274
  cvss: {
@@ -279,6 +291,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
279
291
  title: 'Cross-Site Scripting - Template Literal Injection',
280
292
  description: 'XSS vulnerability through JavaScript template literals (backtick strings) where user input can break out of the template context or inject expressions using ${} syntax, executing arbitrary JavaScript in the client browser context.',
281
293
  severity: 'high',
294
+ levelId: 2,
282
295
  category: 'xss',
283
296
  scanner: 'xss',
284
297
  cvss: {
@@ -301,6 +314,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
301
314
  title: 'Cross-Site Scripting - Mutation XSS',
302
315
  description: 'Mutation-based XSS (mXSS) vulnerability exploiting browser HTML parser quirks and DOM mutations where seemingly safe HTML is transformed into executable script through browser parsing behaviors, bypassing traditional sanitization.',
303
316
  severity: 'high',
317
+ levelId: 2,
304
318
  category: 'xss',
305
319
  scanner: 'xss',
306
320
  cvss: {
@@ -323,6 +337,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
323
337
  title: 'Cross-Site Scripting - Vue.js Template Injection',
324
338
  description: 'Vue.js client-side template injection vulnerability where user input containing Vue expression syntax like {{}} or v-bind directives is evaluated by the Vue template compiler, leading to arbitrary JavaScript execution in the browser context.',
325
339
  severity: 'high',
340
+ levelId: 2,
326
341
  category: 'xss',
327
342
  scanner: 'xss',
328
343
  cvss: {