@zerothreatai/vulnerability-registry 3.0.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +34 -17
- package/dist/categories/configuration.js +561 -60
- package/dist/categories/injection.js +68 -34
- package/dist/categories/sensitive-paths.js +168 -84
- package/dist/categories/ssrf.js +22 -11
- package/dist/categories/xss.js +30 -15
- package/dist/category.d.ts +6 -0
- package/dist/category.js +15 -0
- package/dist/error-codes.d.ts +20 -0
- package/dist/error-codes.js +20 -0
- package/dist/index.d.ts +9 -1
- package/dist/index.js +5 -1
- package/dist/scanner.d.ts +6 -0
- package/dist/scanner.js +22 -0
- package/dist/types.d.ts +2 -0
- package/dist-cjs/categories/authentication.js +34 -17
- package/dist-cjs/categories/configuration.js +561 -60
- package/dist-cjs/categories/injection.js +68 -34
- package/dist-cjs/categories/sensitive-paths.js +168 -84
- package/dist-cjs/categories/ssrf.js +22 -11
- package/dist-cjs/categories/xss.js +30 -15
- package/dist-cjs/category.js +18 -0
- package/dist-cjs/error-codes.js +20 -0
- package/dist-cjs/index.js +7 -1
- package/dist-cjs/scanner.js +25 -0
- package/package.json +35 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +145 -128
- package/src/categories/configuration.ts +1632 -1111
- package/src/categories/injection.ts +158 -124
- package/src/categories/sensitive-paths.ts +168 -84
- package/src/categories/ssrf.ts +22 -11
- package/src/categories/xss.ts +30 -15
- package/src/category.ts +16 -0
- package/src/error-codes.ts +25 -5
- package/src/id-registry.json +1235 -0
- package/src/index.ts +20 -14
- package/src/scanner.ts +23 -0
- package/src/types.ts +4 -2
- package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -378
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -906
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -750
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1791
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -250
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -328
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -242
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -315
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -107
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -86
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -7
- package/src/types.js.map +0 -1
package/src/categories/ssrf.ts
CHANGED
|
@@ -9,11 +9,12 @@ import type { VulnerabilityDefinition } from '../types.js';
|
|
|
9
9
|
|
|
10
10
|
export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
11
11
|
[VulnerabilityCode.SSRF_CLOUD_METADATA]: {
|
|
12
|
-
id:
|
|
12
|
+
id: 450,
|
|
13
13
|
code: VulnerabilityCode.SSRF_CLOUD_METADATA,
|
|
14
14
|
title: 'Server-Side Request Forgery - Cloud Metadata Access',
|
|
15
15
|
description: 'Critical SSRF vulnerability enabling access to cloud provider metadata services (AWS IMDSv1, GCP, Azure) which expose sensitive information including IAM credentials, API tokens, and instance configuration that can lead to full cloud account compromise and lateral movement.',
|
|
16
16
|
severity: 'critical',
|
|
17
|
+
levelId: 1,
|
|
17
18
|
category: 'ssrf',
|
|
18
19
|
scanner: 'ssrf',
|
|
19
20
|
cvss: {
|
|
@@ -31,11 +32,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
31
32
|
},
|
|
32
33
|
|
|
33
34
|
[VulnerabilityCode.SSRF_INTERNAL_SERVICE]: {
|
|
34
|
-
id:
|
|
35
|
+
id: 451,
|
|
35
36
|
code: VulnerabilityCode.SSRF_INTERNAL_SERVICE,
|
|
36
37
|
title: 'Server-Side Request Forgery - Internal Service Access',
|
|
37
38
|
description: 'SSRF vulnerability allowing attackers to access internal network services that should not be reachable from the internet, including databases, admin panels, cache servers, and other infrastructure components protected only by network segmentation without authentication.',
|
|
38
39
|
severity: 'high',
|
|
40
|
+
levelId: 2,
|
|
39
41
|
category: 'ssrf',
|
|
40
42
|
scanner: 'ssrf',
|
|
41
43
|
cvss: {
|
|
@@ -53,11 +55,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
53
55
|
},
|
|
54
56
|
|
|
55
57
|
[VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING]: {
|
|
56
|
-
id:
|
|
58
|
+
id: 452,
|
|
57
59
|
code: VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING,
|
|
58
60
|
title: 'Server-Side Request Forgery - Protocol Smuggling',
|
|
59
61
|
description: 'SSRF vulnerability exploiting non-HTTP protocol handlers like file://, gopher://, dict://, or ftp:// to read local files, interact with internal services using raw TCP, or perform attacks that would not be possible through HTTP requests alone, significantly expanding impact scope.',
|
|
60
62
|
severity: 'high',
|
|
63
|
+
levelId: 2,
|
|
61
64
|
category: 'ssrf',
|
|
62
65
|
scanner: 'ssrf',
|
|
63
66
|
cvss: {
|
|
@@ -75,11 +78,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
75
78
|
},
|
|
76
79
|
|
|
77
80
|
[VulnerabilityCode.SSRF_BLIND_OOB]: {
|
|
78
|
-
id:
|
|
81
|
+
id: 453,
|
|
79
82
|
code: VulnerabilityCode.SSRF_BLIND_OOB,
|
|
80
83
|
title: 'Server-Side Request Forgery - Blind OOB',
|
|
81
84
|
description: 'Blind SSRF vulnerability confirmed through out-of-band DNS or HTTP callbacks indicating the server makes requests to attacker-controlled destinations even though responses are not reflected, enabling internal network scanning and data exfiltration through DNS or timing side channels.',
|
|
82
85
|
severity: 'medium',
|
|
86
|
+
levelId: 3,
|
|
83
87
|
category: 'ssrf',
|
|
84
88
|
scanner: 'ssrf',
|
|
85
89
|
cvss: {
|
|
@@ -100,11 +104,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
100
104
|
// OPEN REDIRECT
|
|
101
105
|
// ========================================
|
|
102
106
|
[VulnerabilityCode.REDIRECT_HEADER_INJECTION]: {
|
|
103
|
-
id:
|
|
107
|
+
id: 454,
|
|
104
108
|
code: VulnerabilityCode.REDIRECT_HEADER_INJECTION,
|
|
105
109
|
title: 'Open Redirect - HTTP Header Injection',
|
|
106
110
|
description: 'Open redirect vulnerability through Location header manipulation allowing attackers to redirect victims to malicious websites after authenticating or interacting with the legitimate application, facilitating phishing attacks that abuse user trust in the original domain.',
|
|
107
111
|
severity: 'medium',
|
|
112
|
+
levelId: 3,
|
|
108
113
|
category: 'business_logic',
|
|
109
114
|
scanner: 'redirect-route',
|
|
110
115
|
cvss: {
|
|
@@ -122,11 +127,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
122
127
|
},
|
|
123
128
|
|
|
124
129
|
[VulnerabilityCode.REDIRECT_JS_NAVIGATION]: {
|
|
125
|
-
id:
|
|
130
|
+
id: 455,
|
|
126
131
|
code: VulnerabilityCode.REDIRECT_JS_NAVIGATION,
|
|
127
132
|
title: 'Open Redirect - JavaScript Navigation',
|
|
128
133
|
description: 'Client-side open redirect vulnerability through JavaScript navigation methods like window.location or location.href being set to user-controlled values, allowing attackers to redirect users to malicious sites through specially crafted URLs that bypass server-side validation.',
|
|
129
134
|
severity: 'medium',
|
|
135
|
+
levelId: 3,
|
|
130
136
|
category: 'business_logic',
|
|
131
137
|
scanner: 'redirect-route',
|
|
132
138
|
cvss: {
|
|
@@ -147,11 +153,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
147
153
|
// HOST HEADER INJECTION
|
|
148
154
|
// ========================================
|
|
149
155
|
[VulnerabilityCode.HOST_CACHE_POISONING]: {
|
|
150
|
-
id:
|
|
156
|
+
id: 456,
|
|
151
157
|
code: VulnerabilityCode.HOST_CACHE_POISONING,
|
|
152
158
|
title: 'Host Header Injection - Cache Poisoning',
|
|
153
159
|
description: 'Host header injection vulnerability where manipulated Host headers are reflected in cached responses, allowing attackers to poison web caches and CDNs with malicious content that is then served to all users, potentially enabling widespread defacement or malware distribution.',
|
|
154
160
|
severity: 'high',
|
|
161
|
+
levelId: 2,
|
|
155
162
|
category: 'configuration',
|
|
156
163
|
scanner: 'host-header',
|
|
157
164
|
cvss: {
|
|
@@ -169,11 +176,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
169
176
|
},
|
|
170
177
|
|
|
171
178
|
[VulnerabilityCode.HOST_PASSWORD_RESET]: {
|
|
172
|
-
id:
|
|
179
|
+
id: 457,
|
|
173
180
|
code: VulnerabilityCode.HOST_PASSWORD_RESET,
|
|
174
181
|
title: 'Host Header Injection - Password Reset Poisoning',
|
|
175
182
|
description: 'Critical host header injection vulnerability in password reset functionality where the injected Host header is used to generate password reset URLs, allowing attackers to receive password reset tokens when victims click the manipulated links in legitimate reset emails.',
|
|
176
183
|
severity: 'high',
|
|
184
|
+
levelId: 2,
|
|
177
185
|
category: 'configuration',
|
|
178
186
|
scanner: 'host-header',
|
|
179
187
|
cvss: {
|
|
@@ -191,11 +199,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
191
199
|
},
|
|
192
200
|
|
|
193
201
|
[VulnerabilityCode.SSRF_FILTER_BYPASS]: {
|
|
194
|
-
id:
|
|
202
|
+
id: 458,
|
|
195
203
|
code: VulnerabilityCode.SSRF_FILTER_BYPASS,
|
|
196
204
|
title: 'Server-Side Request Forgery - Filter Bypass',
|
|
197
205
|
description: 'SSRF vulnerability that bypasses security filters through encoding tricks (URL encoding, IPv6 representation, decimal IP notation), DNS rebinding, or using alternative representations of blocked addresses to reach internal resources despite URL validation controls.',
|
|
198
206
|
severity: 'high',
|
|
207
|
+
levelId: 2,
|
|
199
208
|
category: 'ssrf',
|
|
200
209
|
scanner: 'ssrf',
|
|
201
210
|
cvss: {
|
|
@@ -213,11 +222,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
213
222
|
},
|
|
214
223
|
|
|
215
224
|
[VulnerabilityCode.REDIRECT_META_REFRESH]: {
|
|
216
|
-
id:
|
|
225
|
+
id: 459,
|
|
217
226
|
code: VulnerabilityCode.REDIRECT_META_REFRESH,
|
|
218
227
|
title: 'Open Redirect - Meta Refresh',
|
|
219
228
|
description: 'Open redirect vulnerability through HTML meta refresh tags where user input controls the redirect target URL, enabling phishing attacks by sending victims to malicious sites after a brief delay on the legitimate domain, bypassing some security controls.',
|
|
220
229
|
severity: 'low',
|
|
230
|
+
levelId: 4,
|
|
221
231
|
category: 'business_logic',
|
|
222
232
|
scanner: 'redirect-route',
|
|
223
233
|
cvss: {
|
|
@@ -235,11 +245,12 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
235
245
|
},
|
|
236
246
|
|
|
237
247
|
[VulnerabilityCode.HOST_REDIRECT]: {
|
|
238
|
-
id:
|
|
248
|
+
id: 460,
|
|
239
249
|
code: VulnerabilityCode.HOST_REDIRECT,
|
|
240
250
|
title: 'Host Header Injection - Open Redirect',
|
|
241
251
|
description: 'Host header injection leading to open redirect where the application uses the Host header to generate redirect URLs, allowing attackers to redirect users to malicious domains by manipulating the Host header in their requests.',
|
|
242
252
|
severity: 'medium',
|
|
253
|
+
levelId: 3,
|
|
243
254
|
category: 'configuration',
|
|
244
255
|
scanner: 'host-header',
|
|
245
256
|
cvss: {
|
package/src/categories/xss.ts
CHANGED
|
@@ -9,11 +9,12 @@ import type { VulnerabilityDefinition } from '../types.js';
|
|
|
9
9
|
|
|
10
10
|
export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
11
11
|
[VulnerabilityCode.XSS_REFLECTED]: {
|
|
12
|
-
id:
|
|
12
|
+
id: 400,
|
|
13
13
|
code: VulnerabilityCode.XSS_REFLECTED,
|
|
14
14
|
title: 'Cross-Site Scripting - Reflected',
|
|
15
15
|
description: 'Reflected XSS vulnerability where user input is immediately returned by the server in the response without proper encoding, allowing attackers to inject malicious scripts that execute in the victim browser when they click a crafted link or submit a manipulated form.',
|
|
16
16
|
severity: 'medium',
|
|
17
|
+
levelId: 3,
|
|
17
18
|
category: 'xss',
|
|
18
19
|
scanner: 'xss',
|
|
19
20
|
cvss: {
|
|
@@ -31,11 +32,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
31
32
|
},
|
|
32
33
|
|
|
33
34
|
[VulnerabilityCode.XSS_STORED]: {
|
|
34
|
-
id:
|
|
35
|
+
id: 401,
|
|
35
36
|
code: VulnerabilityCode.XSS_STORED,
|
|
36
37
|
title: 'Cross-Site Scripting - Stored',
|
|
37
38
|
description: 'Critical stored XSS vulnerability where malicious scripts are permanently saved in the application database and served to all users who view the affected content, enabling widespread session hijacking, credential theft, and malware distribution without requiring victim interaction beyond normal usage.',
|
|
38
39
|
severity: 'high',
|
|
40
|
+
levelId: 2,
|
|
39
41
|
category: 'xss',
|
|
40
42
|
scanner: 'xss',
|
|
41
43
|
cvss: {
|
|
@@ -53,11 +55,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
53
55
|
},
|
|
54
56
|
|
|
55
57
|
[VulnerabilityCode.XSS_DOM_BASED]: {
|
|
56
|
-
id:
|
|
58
|
+
id: 402,
|
|
57
59
|
code: VulnerabilityCode.XSS_DOM_BASED,
|
|
58
60
|
title: 'Cross-Site Scripting - DOM Based',
|
|
59
61
|
description: 'DOM-based XSS vulnerability where the attack payload is processed entirely in the client-side JavaScript code without being sent to the server, typically through dangerous sinks like innerHTML, document.write(), or eval() that process URL fragments or user-controlled DOM elements.',
|
|
60
62
|
severity: 'medium',
|
|
63
|
+
levelId: 3,
|
|
61
64
|
category: 'xss',
|
|
62
65
|
scanner: 'xss',
|
|
63
66
|
cvss: {
|
|
@@ -75,11 +78,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
75
78
|
},
|
|
76
79
|
|
|
77
80
|
[VulnerabilityCode.XSS_SVG_INJECTION]: {
|
|
78
|
-
id:
|
|
81
|
+
id: 403,
|
|
79
82
|
code: VulnerabilityCode.XSS_SVG_INJECTION,
|
|
80
83
|
title: 'Cross-Site Scripting - SVG Injection',
|
|
81
84
|
description: 'SVG-based XSS vulnerability where malicious JavaScript is embedded within SVG image files using script elements or event handlers like onload, which execute when the browser renders the SVG file as an image or inline element, bypassing image upload security controls.',
|
|
82
85
|
severity: 'high',
|
|
86
|
+
levelId: 2,
|
|
83
87
|
category: 'xss',
|
|
84
88
|
scanner: 'xss',
|
|
85
89
|
cvss: {
|
|
@@ -97,11 +101,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
97
101
|
},
|
|
98
102
|
|
|
99
103
|
[VulnerabilityCode.XSS_CSTI_ANGULAR]: {
|
|
100
|
-
id:
|
|
104
|
+
id: 404,
|
|
101
105
|
code: VulnerabilityCode.XSS_CSTI_ANGULAR,
|
|
102
106
|
title: 'Cross-Site Scripting - Angular Template Injection',
|
|
103
107
|
description: 'AngularJS client-side template injection vulnerability where user input containing Angular expressions like {{constructor.constructor("alert(1)")()}} is evaluated by the Angular template engine, leading to arbitrary JavaScript execution in the user browser context.',
|
|
104
108
|
severity: 'high',
|
|
109
|
+
levelId: 2,
|
|
105
110
|
category: 'xss',
|
|
106
111
|
scanner: 'xss',
|
|
107
112
|
cvss: {
|
|
@@ -120,11 +125,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
120
125
|
},
|
|
121
126
|
|
|
122
127
|
[VulnerabilityCode.XSS_CSP_BYPASS]: {
|
|
123
|
-
id:
|
|
128
|
+
id: 405,
|
|
124
129
|
code: VulnerabilityCode.XSS_CSP_BYPASS,
|
|
125
130
|
title: 'Cross-Site Scripting - CSP Bypass',
|
|
126
131
|
description: 'XSS vulnerability that bypasses Content Security Policy protections through techniques like JSONP endpoints on whitelisted domains, base tag injection, Angular.js libraries on CDN, or other CSP bypass gadgets that allow script execution despite CSP controls being in place.',
|
|
127
132
|
severity: 'high',
|
|
133
|
+
levelId: 2,
|
|
128
134
|
category: 'xss',
|
|
129
135
|
scanner: 'xss',
|
|
130
136
|
cvss: {
|
|
@@ -142,11 +148,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
142
148
|
},
|
|
143
149
|
|
|
144
150
|
[VulnerabilityCode.XSS_JS_CONTEXT]: {
|
|
145
|
-
id:
|
|
151
|
+
id: 406,
|
|
146
152
|
code: VulnerabilityCode.XSS_JS_CONTEXT,
|
|
147
153
|
title: 'Cross-Site Scripting - JavaScript Context',
|
|
148
154
|
description: 'XSS vulnerability where user input is injected directly into JavaScript code blocks, allowing attackers to break out of string contexts and execute arbitrary JavaScript by injecting quote characters and script code, or modify application logic by injecting new statements.',
|
|
149
155
|
severity: 'high',
|
|
156
|
+
levelId: 2,
|
|
150
157
|
category: 'xss',
|
|
151
158
|
scanner: 'xss',
|
|
152
159
|
cvss: {
|
|
@@ -164,11 +171,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
164
171
|
},
|
|
165
172
|
|
|
166
173
|
[VulnerabilityCode.XSS_EVENT_HANDLER]: {
|
|
167
|
-
id:
|
|
174
|
+
id: 407,
|
|
168
175
|
code: VulnerabilityCode.XSS_EVENT_HANDLER,
|
|
169
176
|
title: 'Cross-Site Scripting - Event Handler Injection',
|
|
170
177
|
description: 'XSS vulnerability through injection into HTML event handler attributes like onclick, onerror, onload, or onmouseover, allowing attackers to execute JavaScript when users interact with or simply view the affected page elements without requiring script tags.',
|
|
171
178
|
severity: 'high',
|
|
179
|
+
levelId: 2,
|
|
172
180
|
category: 'xss',
|
|
173
181
|
scanner: 'xss',
|
|
174
182
|
cvss: {
|
|
@@ -186,11 +194,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
186
194
|
},
|
|
187
195
|
|
|
188
196
|
[VulnerabilityCode.XSS_SCRIPT_INJECTION]: {
|
|
189
|
-
id:
|
|
197
|
+
id: 408,
|
|
190
198
|
code: VulnerabilityCode.XSS_SCRIPT_INJECTION,
|
|
191
199
|
title: 'Cross-Site Scripting - Script Tag Injection',
|
|
192
200
|
description: 'XSS vulnerability where attackers can inject complete script tags into the HTML response, enabling arbitrary JavaScript execution. This is often the most straightforward XSS exploitation when input is not properly sanitized before rendering.',
|
|
193
201
|
severity: 'high',
|
|
202
|
+
levelId: 2,
|
|
194
203
|
category: 'xss',
|
|
195
204
|
scanner: 'xss',
|
|
196
205
|
cvss: {
|
|
@@ -208,11 +217,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
208
217
|
},
|
|
209
218
|
|
|
210
219
|
[VulnerabilityCode.XSS_HTML_INJECTION]: {
|
|
211
|
-
id:
|
|
220
|
+
id: 409,
|
|
212
221
|
code: VulnerabilityCode.XSS_HTML_INJECTION,
|
|
213
222
|
title: 'Cross-Site Scripting - HTML Injection',
|
|
214
223
|
description: 'HTML injection vulnerability where attackers can inject arbitrary HTML elements that modify page structure, enabling phishing attacks through fake login forms, content spoofing, or combination with CSS to overlay malicious content over legitimate page elements.',
|
|
215
224
|
severity: 'medium',
|
|
225
|
+
levelId: 3,
|
|
216
226
|
category: 'xss',
|
|
217
227
|
scanner: 'xss',
|
|
218
228
|
cvss: {
|
|
@@ -230,11 +240,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
230
240
|
},
|
|
231
241
|
|
|
232
242
|
[VulnerabilityCode.XSS_ATTRIBUTE_INJECTION]: {
|
|
233
|
-
id:
|
|
243
|
+
id: 410,
|
|
234
244
|
code: VulnerabilityCode.XSS_ATTRIBUTE_INJECTION,
|
|
235
245
|
title: 'Cross-Site Scripting - Attribute Injection',
|
|
236
246
|
description: 'XSS vulnerability where user input is placed in HTML attributes without proper encoding, allowing attackers to break out of the attribute context and inject new attributes or event handlers by using quote characters and spaces.',
|
|
237
247
|
severity: 'medium',
|
|
248
|
+
levelId: 3,
|
|
238
249
|
category: 'xss',
|
|
239
250
|
scanner: 'xss',
|
|
240
251
|
cvss: {
|
|
@@ -252,11 +263,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
252
263
|
},
|
|
253
264
|
|
|
254
265
|
[VulnerabilityCode.XSS_CSS_INJECTION]: {
|
|
255
|
-
id:
|
|
266
|
+
id: 411,
|
|
256
267
|
code: VulnerabilityCode.XSS_CSS_INJECTION,
|
|
257
268
|
title: 'Cross-Site Scripting - CSS Injection',
|
|
258
269
|
description: 'CSS injection vulnerability where attackers can inject malicious CSS rules to exfiltrate data through CSS selectors and background URLs, modify page appearance for phishing, or in older browsers achieve JavaScript execution through CSS expressions.',
|
|
259
270
|
severity: 'medium',
|
|
271
|
+
levelId: 3,
|
|
260
272
|
category: 'xss',
|
|
261
273
|
scanner: 'xss',
|
|
262
274
|
cvss: {
|
|
@@ -274,11 +286,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
274
286
|
},
|
|
275
287
|
|
|
276
288
|
[VulnerabilityCode.XSS_TEMPLATE_LITERAL]: {
|
|
277
|
-
id:
|
|
289
|
+
id: 412,
|
|
278
290
|
code: VulnerabilityCode.XSS_TEMPLATE_LITERAL,
|
|
279
291
|
title: 'Cross-Site Scripting - Template Literal Injection',
|
|
280
292
|
description: 'XSS vulnerability through JavaScript template literals (backtick strings) where user input can break out of the template context or inject expressions using ${} syntax, executing arbitrary JavaScript in the client browser context.',
|
|
281
293
|
severity: 'high',
|
|
294
|
+
levelId: 2,
|
|
282
295
|
category: 'xss',
|
|
283
296
|
scanner: 'xss',
|
|
284
297
|
cvss: {
|
|
@@ -296,11 +309,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
296
309
|
},
|
|
297
310
|
|
|
298
311
|
[VulnerabilityCode.XSS_MUTATION_BASED]: {
|
|
299
|
-
id:
|
|
312
|
+
id: 413,
|
|
300
313
|
code: VulnerabilityCode.XSS_MUTATION_BASED,
|
|
301
314
|
title: 'Cross-Site Scripting - Mutation XSS',
|
|
302
315
|
description: 'Mutation-based XSS (mXSS) vulnerability exploiting browser HTML parser quirks and DOM mutations where seemingly safe HTML is transformed into executable script through browser parsing behaviors, bypassing traditional sanitization.',
|
|
303
316
|
severity: 'high',
|
|
317
|
+
levelId: 2,
|
|
304
318
|
category: 'xss',
|
|
305
319
|
scanner: 'xss',
|
|
306
320
|
cvss: {
|
|
@@ -318,11 +332,12 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
318
332
|
},
|
|
319
333
|
|
|
320
334
|
[VulnerabilityCode.XSS_CSTI_VUE]: {
|
|
321
|
-
id:
|
|
335
|
+
id: 414,
|
|
322
336
|
code: VulnerabilityCode.XSS_CSTI_VUE,
|
|
323
337
|
title: 'Cross-Site Scripting - Vue.js Template Injection',
|
|
324
338
|
description: 'Vue.js client-side template injection vulnerability where user input containing Vue expression syntax like {{}} or v-bind directives is evaluated by the Vue template compiler, leading to arbitrary JavaScript execution in the browser context.',
|
|
325
339
|
severity: 'high',
|
|
340
|
+
levelId: 2,
|
|
326
341
|
category: 'xss',
|
|
327
342
|
scanner: 'xss',
|
|
328
343
|
cvss: {
|
package/src/category.ts
ADDED
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Category registry - human-friendly titles for categories.
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
export const CATEGORY_REGISTRY: Record<string, { title: string }> = {
|
|
6
|
+
"injection": { title: "Injection" },
|
|
7
|
+
"xss": { title: "Cross-Site Scripting" },
|
|
8
|
+
"authentication": { title: "Authentication" },
|
|
9
|
+
"access_control": { title: "Access Control" },
|
|
10
|
+
"configuration": { title: "Configuration" },
|
|
11
|
+
"information_disclosure": { title: "Information Disclosure" },
|
|
12
|
+
"cryptographic": { title: "Cryptographic" },
|
|
13
|
+
"business_logic": { title: "Business Logic" },
|
|
14
|
+
"ssrf": { title: "Server-Side Request Forgery" },
|
|
15
|
+
"file_inclusion": { title: "File Inclusion" },
|
|
16
|
+
};
|
package/src/error-codes.ts
CHANGED
|
@@ -182,11 +182,31 @@ export enum VulnerabilityCode {
|
|
|
182
182
|
HOST_PASSWORD_RESET = 'HOST_PASSWORD_RESET',
|
|
183
183
|
HOST_REDIRECT = 'HOST_REDIRECT',
|
|
184
184
|
|
|
185
|
-
// ========================================
|
|
186
|
-
// DIRECTORY BROWSING (DIRBROWSE_*)
|
|
187
|
-
// ========================================
|
|
188
|
-
|
|
189
|
-
|
|
185
|
+
// ========================================
|
|
186
|
+
// DIRECTORY BROWSING (DIRBROWSE_*)
|
|
187
|
+
// ========================================
|
|
188
|
+
DIRBROWSE_GENERIC = 'DIRBROWSE_GENERIC',
|
|
189
|
+
DIRBROWSE_GENERIC_SENSITIVE = 'DIRBROWSE_GENERIC_SENSITIVE',
|
|
190
|
+
DIRBROWSE_APACHE = 'DIRBROWSE_APACHE',
|
|
191
|
+
DIRBROWSE_APACHE_SENSITIVE = 'DIRBROWSE_APACHE_SENSITIVE',
|
|
192
|
+
DIRBROWSE_NGINX = 'DIRBROWSE_NGINX',
|
|
193
|
+
DIRBROWSE_NGINX_SENSITIVE = 'DIRBROWSE_NGINX_SENSITIVE',
|
|
194
|
+
DIRBROWSE_IIS = 'DIRBROWSE_IIS',
|
|
195
|
+
DIRBROWSE_IIS_SENSITIVE = 'DIRBROWSE_IIS_SENSITIVE',
|
|
196
|
+
DIRBROWSE_TOMCAT = 'DIRBROWSE_TOMCAT',
|
|
197
|
+
DIRBROWSE_TOMCAT_SENSITIVE = 'DIRBROWSE_TOMCAT_SENSITIVE',
|
|
198
|
+
DIRBROWSE_CADDY = 'DIRBROWSE_CADDY',
|
|
199
|
+
DIRBROWSE_CADDY_SENSITIVE = 'DIRBROWSE_CADDY_SENSITIVE',
|
|
200
|
+
DIRBROWSE_WEBDAV = 'DIRBROWSE_WEBDAV',
|
|
201
|
+
DIRBROWSE_WEBDAV_SENSITIVE = 'DIRBROWSE_WEBDAV_SENSITIVE',
|
|
202
|
+
DIRBROWSE_S3 = 'DIRBROWSE_S3',
|
|
203
|
+
DIRBROWSE_S3_SENSITIVE = 'DIRBROWSE_S3_SENSITIVE',
|
|
204
|
+
DIRBROWSE_GCS = 'DIRBROWSE_GCS',
|
|
205
|
+
DIRBROWSE_GCS_SENSITIVE = 'DIRBROWSE_GCS_SENSITIVE',
|
|
206
|
+
DIRBROWSE_AZURE_BLOB = 'DIRBROWSE_AZURE_BLOB',
|
|
207
|
+
DIRBROWSE_AZURE_BLOB_SENSITIVE = 'DIRBROWSE_AZURE_BLOB_SENSITIVE',
|
|
208
|
+
DIRBROWSE_ENABLED = 'DIRBROWSE_ENABLED',
|
|
209
|
+
DIRBROWSE_SENSITIVE = 'DIRBROWSE_SENSITIVE',
|
|
190
210
|
|
|
191
211
|
// ========================================
|
|
192
212
|
// MASS ASSIGNMENT (MASSASSIGN_*)
|