@zerothreatai/vulnerability-registry 4.0.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +17 -17
- package/dist/categories/configuration.js +80 -80
- package/dist/categories/injection.js +34 -34
- package/dist/categories/sensitive-paths.js +84 -84
- package/dist/categories/ssrf.js +11 -11
- package/dist/categories/xss.js +15 -15
- package/dist-cjs/categories/authentication.js +17 -17
- package/dist-cjs/categories/configuration.js +80 -80
- package/dist-cjs/categories/injection.js +34 -34
- package/dist-cjs/categories/sensitive-paths.js +84 -84
- package/dist-cjs/categories/ssrf.js +11 -11
- package/dist-cjs/categories/xss.js +15 -15
- package/package.json +35 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +17 -17
- package/src/categories/configuration.ts +80 -80
- package/src/categories/injection.ts +34 -34
- package/src/categories/sensitive-paths.ts +84 -84
- package/src/categories/ssrf.ts +11 -11
- package/src/categories/xss.ts +15 -15
- package/src/id-registry.json +1235 -0
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -392
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -1782
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -781
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1872
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -258
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -340
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -280
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -350
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -92
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -88
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -6
- package/src/types.js.map +0 -1
|
@@ -12,7 +12,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
12
12
|
// SECURITY HEADERS
|
|
13
13
|
// ========================================
|
|
14
14
|
[VulnerabilityCode.HEADER_MISSING_CSP]: {
|
|
15
|
-
id:
|
|
15
|
+
id: 200,
|
|
16
16
|
code: VulnerabilityCode.HEADER_MISSING_CSP,
|
|
17
17
|
title: 'Missing Security Header - Content-Security-Policy',
|
|
18
18
|
description: 'The application does not implement Content-Security-Policy header, leaving it vulnerable to cross-site scripting attacks that could be mitigated by restricting the sources from which scripts, styles, and other resources can be loaded into the page.',
|
|
@@ -35,7 +35,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
35
35
|
},
|
|
36
36
|
|
|
37
37
|
[VulnerabilityCode.HEADER_MISSING_HSTS]: {
|
|
38
|
-
id:
|
|
38
|
+
id: 201,
|
|
39
39
|
code: VulnerabilityCode.HEADER_MISSING_HSTS,
|
|
40
40
|
title: 'Missing Security Header - Strict-Transport-Security',
|
|
41
41
|
description: 'The application does not implement HSTS (HTTP Strict Transport Security) header, leaving users vulnerable to SSL stripping attacks and man-in-the-middle downgrades from HTTPS to HTTP connections on initial visits or after cookie expiration.',
|
|
@@ -58,7 +58,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
58
58
|
},
|
|
59
59
|
|
|
60
60
|
[VulnerabilityCode.HEADER_HSTS_BAD_MAX_AGE]: {
|
|
61
|
-
id:
|
|
61
|
+
id: 202,
|
|
62
62
|
code: VulnerabilityCode.HEADER_HSTS_BAD_MAX_AGE,
|
|
63
63
|
title: 'HSTS Misconfiguration - Invalid Max-Age',
|
|
64
64
|
description: 'The Strict-Transport-Security header uses an invalid or malformed max-age value, preventing reliable HTTPS enforcement.',
|
|
@@ -81,7 +81,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
81
81
|
},
|
|
82
82
|
|
|
83
83
|
[VulnerabilityCode.HEADER_HSTS_SHORT_MAX_AGE]: {
|
|
84
|
-
id:
|
|
84
|
+
id: 203,
|
|
85
85
|
code: VulnerabilityCode.HEADER_HSTS_SHORT_MAX_AGE,
|
|
86
86
|
title: 'HSTS Misconfiguration - Max-Age Too Short',
|
|
87
87
|
description: 'The Strict-Transport-Security header uses a short max-age value that weakens HTTPS enforcement and allows downgrade risk to return quickly.',
|
|
@@ -104,7 +104,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
104
104
|
},
|
|
105
105
|
|
|
106
106
|
[VulnerabilityCode.HEADER_HSTS_NO_INCLUDESUBDOMAINS]: {
|
|
107
|
-
id:
|
|
107
|
+
id: 204,
|
|
108
108
|
code: VulnerabilityCode.HEADER_HSTS_NO_INCLUDESUBDOMAINS,
|
|
109
109
|
title: 'HSTS Misconfiguration - Missing includeSubDomains',
|
|
110
110
|
description: 'The Strict-Transport-Security header is missing includeSubDomains, leaving subdomains unprotected from downgrade and stripping attacks.',
|
|
@@ -127,7 +127,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
127
127
|
},
|
|
128
128
|
|
|
129
129
|
[VulnerabilityCode.HEADER_HSTS_PRELOAD_LOW_MAX_AGE]: {
|
|
130
|
-
id:
|
|
130
|
+
id: 205,
|
|
131
131
|
code: VulnerabilityCode.HEADER_HSTS_PRELOAD_LOW_MAX_AGE,
|
|
132
132
|
title: 'HSTS Preload Requirements Not Met',
|
|
133
133
|
description: 'The HSTS header indicates preload intent but does not meet preload requirements, such as a sufficiently long max-age or includeSubDomains, reducing preload effectiveness.',
|
|
@@ -150,7 +150,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
150
150
|
},
|
|
151
151
|
|
|
152
152
|
[VulnerabilityCode.HEADER_MISSING_XFRAME]: {
|
|
153
|
-
id:
|
|
153
|
+
id: 206,
|
|
154
154
|
code: VulnerabilityCode.HEADER_MISSING_XFRAME,
|
|
155
155
|
title: 'Missing Security Header - X-Frame-Options',
|
|
156
156
|
description: 'The application does not set X-Frame-Options header, making it vulnerable to clickjacking attacks where malicious websites can embed the application in invisible iframes and trick users into performing unintended actions through deceptive UI overlays.',
|
|
@@ -173,7 +173,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
173
173
|
},
|
|
174
174
|
|
|
175
175
|
[VulnerabilityCode.HEADER_WEAK_CSP]: {
|
|
176
|
-
id:
|
|
176
|
+
id: 207,
|
|
177
177
|
code: VulnerabilityCode.HEADER_WEAK_CSP,
|
|
178
178
|
title: 'Weak Content-Security-Policy Configuration',
|
|
179
179
|
description: 'The Content-Security-Policy header contains unsafe directives like unsafe-inline, unsafe-eval, or overly permissive source allowlists that significantly reduce its effectiveness as an XSS mitigation and may create false sense of security.',
|
|
@@ -196,7 +196,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
196
196
|
},
|
|
197
197
|
|
|
198
198
|
[VulnerabilityCode.HEADER_CSP_REPORT_ONLY]: {
|
|
199
|
-
id:
|
|
199
|
+
id: 208,
|
|
200
200
|
code: VulnerabilityCode.HEADER_CSP_REPORT_ONLY,
|
|
201
201
|
title: 'Content-Security-Policy Report-Only Enabled',
|
|
202
202
|
description: 'The Content-Security-Policy header is deployed in report-only mode, which does not enforce protections and allows unsafe content to execute while only logging violations.',
|
|
@@ -219,7 +219,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
219
219
|
},
|
|
220
220
|
|
|
221
221
|
[VulnerabilityCode.HEADER_CSP_WEAK_DIRECTIVES]: {
|
|
222
|
-
id:
|
|
222
|
+
id: 209,
|
|
223
223
|
code: VulnerabilityCode.HEADER_CSP_WEAK_DIRECTIVES,
|
|
224
224
|
title: 'Content-Security-Policy Contains Unsafe Directives',
|
|
225
225
|
description: 'The Content-Security-Policy header includes unsafe directives such as unsafe-inline or unsafe-eval that reduce XSS protection and allow risky script execution paths.',
|
|
@@ -242,7 +242,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
242
242
|
},
|
|
243
243
|
|
|
244
244
|
[VulnerabilityCode.HEADER_CSP_DATA_URI_SCRIPT]: {
|
|
245
|
-
id:
|
|
245
|
+
id: 210,
|
|
246
246
|
code: VulnerabilityCode.HEADER_CSP_DATA_URI_SCRIPT,
|
|
247
247
|
title: 'Content-Security-Policy Allows data: in script-src',
|
|
248
248
|
description: 'The CSP allows data: URIs for script execution, which can enable script injection through crafted data URLs and weaken XSS protections.',
|
|
@@ -265,7 +265,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
265
265
|
},
|
|
266
266
|
|
|
267
267
|
[VulnerabilityCode.HEADER_CSP_BLOB_URI_SCRIPT]: {
|
|
268
|
-
id:
|
|
268
|
+
id: 211,
|
|
269
269
|
code: VulnerabilityCode.HEADER_CSP_BLOB_URI_SCRIPT,
|
|
270
270
|
title: 'Content-Security-Policy Allows blob: in script-src',
|
|
271
271
|
description: 'The CSP allows blob: URIs for script execution, which can be abused to load attacker-controlled scripts in some contexts and weaken XSS mitigations.',
|
|
@@ -288,7 +288,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
288
288
|
},
|
|
289
289
|
|
|
290
290
|
[VulnerabilityCode.HEADER_CSP_WILDCARD_DEFAULT]: {
|
|
291
|
-
id:
|
|
291
|
+
id: 212,
|
|
292
292
|
code: VulnerabilityCode.HEADER_CSP_WILDCARD_DEFAULT,
|
|
293
293
|
title: 'Content-Security-Policy default-src Uses Wildcard',
|
|
294
294
|
description: 'The CSP default-src directive allows all origins, which effectively disables the protection and allows untrusted content to load.',
|
|
@@ -311,7 +311,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
311
311
|
},
|
|
312
312
|
|
|
313
313
|
[VulnerabilityCode.HEADER_CSP_NO_BASE_URI]: {
|
|
314
|
-
id:
|
|
314
|
+
id: 213,
|
|
315
315
|
code: VulnerabilityCode.HEADER_CSP_NO_BASE_URI,
|
|
316
316
|
title: 'Content-Security-Policy Missing base-uri Directive',
|
|
317
317
|
description: 'The CSP does not include a base-uri directive, allowing the base URL to be set by injected markup and enabling abuse of relative URL resolution.',
|
|
@@ -334,7 +334,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
334
334
|
},
|
|
335
335
|
|
|
336
336
|
[VulnerabilityCode.HEADER_CSP_NO_OBJECT_SRC]: {
|
|
337
|
-
id:
|
|
337
|
+
id: 214,
|
|
338
338
|
code: VulnerabilityCode.HEADER_CSP_NO_OBJECT_SRC,
|
|
339
339
|
title: 'Content-Security-Policy Missing object-src Directive',
|
|
340
340
|
description: 'The CSP does not include an object-src directive, allowing embedded objects to load from arbitrary origins and weakening defense-in-depth against plugin-based risks.',
|
|
@@ -357,7 +357,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
357
357
|
},
|
|
358
358
|
|
|
359
359
|
[VulnerabilityCode.HEADER_CSP_NO_FRAME_ANCESTORS]: {
|
|
360
|
-
id:
|
|
360
|
+
id: 215,
|
|
361
361
|
code: VulnerabilityCode.HEADER_CSP_NO_FRAME_ANCESTORS,
|
|
362
362
|
title: 'Content-Security-Policy Missing frame-ancestors Directive',
|
|
363
363
|
description: 'The CSP does not include a frame-ancestors directive, leaving pages potentially frameable and vulnerable to clickjacking attacks.',
|
|
@@ -380,7 +380,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
380
380
|
},
|
|
381
381
|
|
|
382
382
|
[VulnerabilityCode.HEADER_CORS_MISCONFIGURED]: {
|
|
383
|
-
id:
|
|
383
|
+
id: 216,
|
|
384
384
|
code: VulnerabilityCode.HEADER_CORS_MISCONFIGURED,
|
|
385
385
|
title: 'CORS Misconfiguration',
|
|
386
386
|
description: 'Cross-Origin Resource Sharing is misconfigured with overly permissive Access-Control-Allow-Origin headers including wildcard (*) with credentials, or dynamic reflection of Origin header without proper validation, enabling cross-origin data theft.',
|
|
@@ -403,7 +403,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
403
403
|
},
|
|
404
404
|
|
|
405
405
|
[VulnerabilityCode.HEADER_CORS_STAR_WITH_CREDENTIALS]: {
|
|
406
|
-
id:
|
|
406
|
+
id: 217,
|
|
407
407
|
code: VulnerabilityCode.HEADER_CORS_STAR_WITH_CREDENTIALS,
|
|
408
408
|
title: 'CORS Wildcard With Credentials',
|
|
409
409
|
description: 'Access-Control-Allow-Origin is set to * while Access-Control-Allow-Credentials is enabled, which browsers block but signals a dangerous CORS policy that can be misapplied in some environments.',
|
|
@@ -426,7 +426,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
426
426
|
},
|
|
427
427
|
|
|
428
428
|
[VulnerabilityCode.HEADER_CORS_ORIGIN_REFLECT_NO_VARY]: {
|
|
429
|
-
id:
|
|
429
|
+
id: 218,
|
|
430
430
|
code: VulnerabilityCode.HEADER_CORS_ORIGIN_REFLECT_NO_VARY,
|
|
431
431
|
title: 'CORS Origin Reflection Without Vary',
|
|
432
432
|
description: 'The Origin header is reflected in Access-Control-Allow-Origin without Vary: Origin, which can lead to cache poisoning and unintended cross-origin access.',
|
|
@@ -449,7 +449,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
449
449
|
},
|
|
450
450
|
|
|
451
451
|
[VulnerabilityCode.HEADER_CORS_NULL_ORIGIN]: {
|
|
452
|
-
id:
|
|
452
|
+
id: 219,
|
|
453
453
|
code: VulnerabilityCode.HEADER_CORS_NULL_ORIGIN,
|
|
454
454
|
title: 'CORS Allows Null Origin',
|
|
455
455
|
description: 'Access-Control-Allow-Origin allows the null origin, enabling requests from opaque origins such as sandboxed iframes and file URLs that can be abused to access sensitive data.',
|
|
@@ -472,7 +472,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
472
472
|
},
|
|
473
473
|
|
|
474
474
|
[VulnerabilityCode.HEADER_CORS_WILDCARD_SUBDOMAIN]: {
|
|
475
|
-
id:
|
|
475
|
+
id: 220,
|
|
476
476
|
code: VulnerabilityCode.HEADER_CORS_WILDCARD_SUBDOMAIN,
|
|
477
477
|
title: 'CORS Allows Wildcard Subdomains',
|
|
478
478
|
description: 'CORS policies allow wildcard subdomains that can be abused if any subdomain is compromised or can be controlled by untrusted parties.',
|
|
@@ -498,7 +498,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
498
498
|
// DIRECTORY BROWSING
|
|
499
499
|
// ========================================
|
|
500
500
|
[VulnerabilityCode.DIRBROWSE_GENERIC]: {
|
|
501
|
-
id:
|
|
501
|
+
id: 221,
|
|
502
502
|
code: VulnerabilityCode.DIRBROWSE_GENERIC,
|
|
503
503
|
title: 'Directory Listing Enabled (Generic)',
|
|
504
504
|
description: 'Directory listing is enabled and exposes directory contents to unauthenticated visitors, revealing application structure and file names.',
|
|
@@ -521,7 +521,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
521
521
|
},
|
|
522
522
|
|
|
523
523
|
[VulnerabilityCode.DIRBROWSE_GENERIC_SENSITIVE]: {
|
|
524
|
-
id:
|
|
524
|
+
id: 222,
|
|
525
525
|
code: VulnerabilityCode.DIRBROWSE_GENERIC_SENSITIVE,
|
|
526
526
|
title: 'Directory Listing Exposing Sensitive Content (Generic)',
|
|
527
527
|
description: 'Directory listing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -544,7 +544,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
544
544
|
},
|
|
545
545
|
|
|
546
546
|
[VulnerabilityCode.DIRBROWSE_APACHE]: {
|
|
547
|
-
id:
|
|
547
|
+
id: 223,
|
|
548
548
|
code: VulnerabilityCode.DIRBROWSE_APACHE,
|
|
549
549
|
title: 'Apache Autoindex Enabled',
|
|
550
550
|
description: 'Apache autoindex is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -567,7 +567,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
567
567
|
},
|
|
568
568
|
|
|
569
569
|
[VulnerabilityCode.DIRBROWSE_APACHE_SENSITIVE]: {
|
|
570
|
-
id:
|
|
570
|
+
id: 224,
|
|
571
571
|
code: VulnerabilityCode.DIRBROWSE_APACHE_SENSITIVE,
|
|
572
572
|
title: 'Apache Autoindex Exposing Sensitive Content',
|
|
573
573
|
description: 'Apache autoindex is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -590,7 +590,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
590
590
|
},
|
|
591
591
|
|
|
592
592
|
[VulnerabilityCode.DIRBROWSE_NGINX]: {
|
|
593
|
-
id:
|
|
593
|
+
id: 225,
|
|
594
594
|
code: VulnerabilityCode.DIRBROWSE_NGINX,
|
|
595
595
|
title: 'Nginx Autoindex Enabled',
|
|
596
596
|
description: 'Nginx autoindex is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -613,7 +613,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
613
613
|
},
|
|
614
614
|
|
|
615
615
|
[VulnerabilityCode.DIRBROWSE_NGINX_SENSITIVE]: {
|
|
616
|
-
id:
|
|
616
|
+
id: 226,
|
|
617
617
|
code: VulnerabilityCode.DIRBROWSE_NGINX_SENSITIVE,
|
|
618
618
|
title: 'Nginx Autoindex Exposing Sensitive Content',
|
|
619
619
|
description: 'Nginx autoindex is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -636,7 +636,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
636
636
|
},
|
|
637
637
|
|
|
638
638
|
[VulnerabilityCode.DIRBROWSE_IIS]: {
|
|
639
|
-
id:
|
|
639
|
+
id: 227,
|
|
640
640
|
code: VulnerabilityCode.DIRBROWSE_IIS,
|
|
641
641
|
title: 'IIS Directory Browsing Enabled',
|
|
642
642
|
description: 'IIS directory browsing is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -659,7 +659,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
659
659
|
},
|
|
660
660
|
|
|
661
661
|
[VulnerabilityCode.DIRBROWSE_IIS_SENSITIVE]: {
|
|
662
|
-
id:
|
|
662
|
+
id: 228,
|
|
663
663
|
code: VulnerabilityCode.DIRBROWSE_IIS_SENSITIVE,
|
|
664
664
|
title: 'IIS Directory Browsing Exposing Sensitive Content',
|
|
665
665
|
description: 'IIS directory browsing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -682,7 +682,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
682
682
|
},
|
|
683
683
|
|
|
684
684
|
[VulnerabilityCode.DIRBROWSE_TOMCAT]: {
|
|
685
|
-
id:
|
|
685
|
+
id: 229,
|
|
686
686
|
code: VulnerabilityCode.DIRBROWSE_TOMCAT,
|
|
687
687
|
title: 'Tomcat Directory Listing Enabled',
|
|
688
688
|
description: 'Tomcat directory listing is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -705,7 +705,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
705
705
|
},
|
|
706
706
|
|
|
707
707
|
[VulnerabilityCode.DIRBROWSE_TOMCAT_SENSITIVE]: {
|
|
708
|
-
id:
|
|
708
|
+
id: 230,
|
|
709
709
|
code: VulnerabilityCode.DIRBROWSE_TOMCAT_SENSITIVE,
|
|
710
710
|
title: 'Tomcat Directory Listing Exposing Sensitive Content',
|
|
711
711
|
description: 'Tomcat directory listing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -728,7 +728,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
728
728
|
},
|
|
729
729
|
|
|
730
730
|
[VulnerabilityCode.DIRBROWSE_CADDY]: {
|
|
731
|
-
id:
|
|
731
|
+
id: 231,
|
|
732
732
|
code: VulnerabilityCode.DIRBROWSE_CADDY,
|
|
733
733
|
title: 'Caddy File Server Browsing Enabled',
|
|
734
734
|
description: 'Caddy file server browsing is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -751,7 +751,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
751
751
|
},
|
|
752
752
|
|
|
753
753
|
[VulnerabilityCode.DIRBROWSE_CADDY_SENSITIVE]: {
|
|
754
|
-
id:
|
|
754
|
+
id: 232,
|
|
755
755
|
code: VulnerabilityCode.DIRBROWSE_CADDY_SENSITIVE,
|
|
756
756
|
title: 'Caddy File Server Browsing Exposing Sensitive Content',
|
|
757
757
|
description: 'Caddy file server browsing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -774,7 +774,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
774
774
|
},
|
|
775
775
|
|
|
776
776
|
[VulnerabilityCode.DIRBROWSE_WEBDAV]: {
|
|
777
|
-
id:
|
|
777
|
+
id: 233,
|
|
778
778
|
code: VulnerabilityCode.DIRBROWSE_WEBDAV,
|
|
779
779
|
title: 'WebDAV Directory Listing Enabled',
|
|
780
780
|
description: 'WebDAV responses expose directory contents, allowing unauthenticated browsing of files and folders.',
|
|
@@ -797,7 +797,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
797
797
|
},
|
|
798
798
|
|
|
799
799
|
[VulnerabilityCode.DIRBROWSE_WEBDAV_SENSITIVE]: {
|
|
800
|
-
id:
|
|
800
|
+
id: 234,
|
|
801
801
|
code: VulnerabilityCode.DIRBROWSE_WEBDAV_SENSITIVE,
|
|
802
802
|
title: 'WebDAV Directory Listing Exposing Sensitive Content',
|
|
803
803
|
description: 'WebDAV responses expose directories containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -820,7 +820,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
820
820
|
},
|
|
821
821
|
|
|
822
822
|
[VulnerabilityCode.DIRBROWSE_S3]: {
|
|
823
|
-
id:
|
|
823
|
+
id: 235,
|
|
824
824
|
code: VulnerabilityCode.DIRBROWSE_S3,
|
|
825
825
|
title: 'S3 Bucket Listing Enabled',
|
|
826
826
|
description: 'An S3 bucket listing is exposed, allowing unauthenticated enumeration of object keys.',
|
|
@@ -843,7 +843,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
843
843
|
},
|
|
844
844
|
|
|
845
845
|
[VulnerabilityCode.DIRBROWSE_S3_SENSITIVE]: {
|
|
846
|
-
id:
|
|
846
|
+
id: 236,
|
|
847
847
|
code: VulnerabilityCode.DIRBROWSE_S3_SENSITIVE,
|
|
848
848
|
title: 'S3 Bucket Listing Exposing Sensitive Content',
|
|
849
849
|
description: 'An S3 bucket listing is exposed and includes sensitive objects such as backups, credentials, or configuration artifacts.',
|
|
@@ -866,7 +866,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
866
866
|
},
|
|
867
867
|
|
|
868
868
|
[VulnerabilityCode.DIRBROWSE_GCS]: {
|
|
869
|
-
id:
|
|
869
|
+
id: 237,
|
|
870
870
|
code: VulnerabilityCode.DIRBROWSE_GCS,
|
|
871
871
|
title: 'GCS Bucket Listing Enabled',
|
|
872
872
|
description: 'A Google Cloud Storage bucket listing is exposed, allowing unauthenticated enumeration of object keys.',
|
|
@@ -889,7 +889,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
889
889
|
},
|
|
890
890
|
|
|
891
891
|
[VulnerabilityCode.DIRBROWSE_GCS_SENSITIVE]: {
|
|
892
|
-
id:
|
|
892
|
+
id: 238,
|
|
893
893
|
code: VulnerabilityCode.DIRBROWSE_GCS_SENSITIVE,
|
|
894
894
|
title: 'GCS Bucket Listing Exposing Sensitive Content',
|
|
895
895
|
description: 'A Google Cloud Storage bucket listing is exposed and includes sensitive objects such as backups, credentials, or configuration artifacts.',
|
|
@@ -912,7 +912,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
912
912
|
},
|
|
913
913
|
|
|
914
914
|
[VulnerabilityCode.DIRBROWSE_AZURE_BLOB]: {
|
|
915
|
-
id:
|
|
915
|
+
id: 239,
|
|
916
916
|
code: VulnerabilityCode.DIRBROWSE_AZURE_BLOB,
|
|
917
917
|
title: 'Azure Blob Container Listing Enabled',
|
|
918
918
|
description: 'An Azure Blob container listing is exposed, allowing unauthenticated enumeration of blob names.',
|
|
@@ -935,7 +935,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
935
935
|
},
|
|
936
936
|
|
|
937
937
|
[VulnerabilityCode.DIRBROWSE_AZURE_BLOB_SENSITIVE]: {
|
|
938
|
-
id:
|
|
938
|
+
id: 240,
|
|
939
939
|
code: VulnerabilityCode.DIRBROWSE_AZURE_BLOB_SENSITIVE,
|
|
940
940
|
title: 'Azure Blob Container Listing Exposing Sensitive Content',
|
|
941
941
|
description: 'An Azure Blob container listing is exposed and includes sensitive blobs such as backups, credentials, or configuration artifacts.',
|
|
@@ -959,7 +959,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
959
959
|
|
|
960
960
|
// Legacy generic codes (keep for backward compatibility)
|
|
961
961
|
[VulnerabilityCode.DIRBROWSE_ENABLED]: {
|
|
962
|
-
id:
|
|
962
|
+
id: 241,
|
|
963
963
|
code: VulnerabilityCode.DIRBROWSE_ENABLED,
|
|
964
964
|
title: 'Directory Listing Enabled',
|
|
965
965
|
description: 'Web server directory listing is enabled, exposing the contents of directories to anyone who browses to them without an index file. This reveals application structure, backup files, configuration files, and potentially sensitive data to attackers.',
|
|
@@ -982,7 +982,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
982
982
|
},
|
|
983
983
|
|
|
984
984
|
[VulnerabilityCode.DIRBROWSE_SENSITIVE]: {
|
|
985
|
-
id:
|
|
985
|
+
id: 242,
|
|
986
986
|
code: VulnerabilityCode.DIRBROWSE_SENSITIVE,
|
|
987
987
|
title: 'Directory Listing Exposing Sensitive Content',
|
|
988
988
|
description: 'Directory listing is enabled on a directory containing sensitive files like backups, configuration files, source code, or credentials. This elevates the risk significantly as attackers can directly access sensitive information without guessing filenames.',
|
|
@@ -1008,7 +1008,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1008
1008
|
// CLICKJACKING
|
|
1009
1009
|
// ========================================
|
|
1010
1010
|
[VulnerabilityCode.CLICK_FRAMEABLE]: {
|
|
1011
|
-
id:
|
|
1011
|
+
id: 243,
|
|
1012
1012
|
code: VulnerabilityCode.CLICK_FRAMEABLE,
|
|
1013
1013
|
title: 'Clickjacking - Page Frameable',
|
|
1014
1014
|
description: 'The application pages can be embedded in iframes on malicious websites, enabling clickjacking attacks where attackers overlay transparent frames over deceptive UI elements to trick users into clicking hidden buttons or links that perform unintended actions.',
|
|
@@ -1034,7 +1034,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1034
1034
|
// DESERIALIZATION
|
|
1035
1035
|
// ========================================
|
|
1036
1036
|
[VulnerabilityCode.DESER_JAVA]: {
|
|
1037
|
-
id:
|
|
1037
|
+
id: 244,
|
|
1038
1038
|
code: VulnerabilityCode.DESER_JAVA,
|
|
1039
1039
|
title: 'Insecure Deserialization - Java',
|
|
1040
1040
|
description: 'Critical Java deserialization vulnerability where untrusted serialized objects are processed, allowing attackers to achieve remote code execution through gadget chains in common libraries like Apache Commons Collections, Spring Framework, or other classpath dependencies.',
|
|
@@ -1057,7 +1057,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1057
1057
|
},
|
|
1058
1058
|
|
|
1059
1059
|
[VulnerabilityCode.DESER_PHP]: {
|
|
1060
|
-
id:
|
|
1060
|
+
id: 245,
|
|
1061
1061
|
code: VulnerabilityCode.DESER_PHP,
|
|
1062
1062
|
title: 'Insecure Deserialization - PHP',
|
|
1063
1063
|
description: 'Critical PHP deserialization vulnerability where unserialize() processes attacker-controlled data, enabling object injection attacks through magic methods like __wakeup(), __destruct(), or __toString() in application or framework classes for remote code execution.',
|
|
@@ -1080,7 +1080,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1080
1080
|
},
|
|
1081
1081
|
|
|
1082
1082
|
[VulnerabilityCode.DESER_PYTHON]: {
|
|
1083
|
-
id:
|
|
1083
|
+
id: 246,
|
|
1084
1084
|
code: VulnerabilityCode.DESER_PYTHON,
|
|
1085
1085
|
title: 'Insecure Deserialization - Python',
|
|
1086
1086
|
description: 'Critical Python deserialization vulnerability through pickle/cPickle processing of untrusted data, enabling remote code execution via __reduce__ method exploitation. Python pickle is inherently unsafe and should never process untrusted input.',
|
|
@@ -1103,7 +1103,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1103
1103
|
},
|
|
1104
1104
|
|
|
1105
1105
|
[VulnerabilityCode.DESER_DOTNET]: {
|
|
1106
|
-
id:
|
|
1106
|
+
id: 247,
|
|
1107
1107
|
code: VulnerabilityCode.DESER_DOTNET,
|
|
1108
1108
|
title: 'Insecure Deserialization - .NET',
|
|
1109
1109
|
description: 'Critical .NET deserialization vulnerability through BinaryFormatter, ObjectStateFormatter, LosFormatter, or other dangerous formatters processing untrusted data, enabling remote code execution through gadget chains in the .NET runtime or third-party libraries.',
|
|
@@ -1126,7 +1126,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1126
1126
|
},
|
|
1127
1127
|
|
|
1128
1128
|
[VulnerabilityCode.DESER_RUBY]: {
|
|
1129
|
-
id:
|
|
1129
|
+
id: 248,
|
|
1130
1130
|
code: VulnerabilityCode.DESER_RUBY,
|
|
1131
1131
|
title: 'Insecure Deserialization - Ruby',
|
|
1132
1132
|
description: 'Critical Ruby deserialization vulnerability through Marshal.load or YAML.load processing untrusted data, enabling remote code execution through Ruby object instantiation gadgets that execute arbitrary code during object reconstruction.',
|
|
@@ -1149,7 +1149,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1149
1149
|
},
|
|
1150
1150
|
|
|
1151
1151
|
[VulnerabilityCode.DESER_NODE]: {
|
|
1152
|
-
id:
|
|
1152
|
+
id: 249,
|
|
1153
1153
|
code: VulnerabilityCode.DESER_NODE,
|
|
1154
1154
|
title: 'Insecure Deserialization - Node.js',
|
|
1155
1155
|
description: 'Critical Node.js deserialization vulnerability through node-serialize, funcster, or similar libraries that execute JavaScript during deserialization, enabling remote code execution when attacker-controlled serialized data containing functions or IIFE is processed.',
|
|
@@ -1172,7 +1172,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1172
1172
|
},
|
|
1173
1173
|
|
|
1174
1174
|
[VulnerabilityCode.CLICK_PARTIAL_PROTECTION]: {
|
|
1175
|
-
id:
|
|
1175
|
+
id: 250,
|
|
1176
1176
|
code: VulnerabilityCode.CLICK_PARTIAL_PROTECTION,
|
|
1177
1177
|
title: 'Clickjacking - Partial Protection',
|
|
1178
1178
|
description: 'Incomplete clickjacking protection where X-Frame-Options or frame-ancestors CSP is only applied on some pages, uses weak values like ALLOW-FROM with bypassable origins, or has inconsistent implementation allowing certain pages to be framed.',
|
|
@@ -1195,7 +1195,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1195
1195
|
},
|
|
1196
1196
|
|
|
1197
1197
|
[VulnerabilityCode.HEADER_MISSING_XCONTENT_TYPE]: {
|
|
1198
|
-
id:
|
|
1198
|
+
id: 251,
|
|
1199
1199
|
code: VulnerabilityCode.HEADER_MISSING_XCONTENT_TYPE,
|
|
1200
1200
|
title: 'Missing Security Header - X-Content-Type-Options',
|
|
1201
1201
|
description: 'The application does not set X-Content-Type-Options: nosniff header, allowing browsers to perform MIME-type sniffing that can lead to XSS attacks when user-uploaded content is served with incorrect Content-Type and browsers execute it as script.',
|
|
@@ -1218,7 +1218,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1218
1218
|
},
|
|
1219
1219
|
|
|
1220
1220
|
[VulnerabilityCode.HEADER_XCONTENT_TYPE_INVALID]: {
|
|
1221
|
-
id:
|
|
1221
|
+
id: 252,
|
|
1222
1222
|
code: VulnerabilityCode.HEADER_XCONTENT_TYPE_INVALID,
|
|
1223
1223
|
title: 'Invalid Security Header - X-Content-Type-Options',
|
|
1224
1224
|
description: 'The X-Content-Type-Options header is present but misconfigured (not set to nosniff), which can allow MIME sniffing and reduce protection against content-type confusion.',
|
|
@@ -1241,7 +1241,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1241
1241
|
},
|
|
1242
1242
|
|
|
1243
1243
|
[VulnerabilityCode.HEADER_MISSING_REFERRER_POLICY]: {
|
|
1244
|
-
id:
|
|
1244
|
+
id: 253,
|
|
1245
1245
|
code: VulnerabilityCode.HEADER_MISSING_REFERRER_POLICY,
|
|
1246
1246
|
title: 'Missing Security Header - Referrer-Policy',
|
|
1247
1247
|
description: 'The application does not implement Referrer-Policy header, potentially leaking sensitive URL information including session tokens, user IDs, or query parameters to external sites when users click links or resources are loaded from third-party domains.',
|
|
@@ -1264,7 +1264,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1264
1264
|
},
|
|
1265
1265
|
|
|
1266
1266
|
[VulnerabilityCode.HEADER_REFERRER_POLICY_UNSAFE]: {
|
|
1267
|
-
id:
|
|
1267
|
+
id: 254,
|
|
1268
1268
|
code: VulnerabilityCode.HEADER_REFERRER_POLICY_UNSAFE,
|
|
1269
1269
|
title: 'Unsafe Referrer-Policy Configuration',
|
|
1270
1270
|
description: 'The Referrer-Policy header is set to a permissive value that can leak full URLs and sensitive query parameters to external origins.',
|
|
@@ -1287,7 +1287,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1287
1287
|
},
|
|
1288
1288
|
|
|
1289
1289
|
[VulnerabilityCode.HEADER_MISSING_PERMISSIONS_POLICY]: {
|
|
1290
|
-
id:
|
|
1290
|
+
id: 255,
|
|
1291
1291
|
code: VulnerabilityCode.HEADER_MISSING_PERMISSIONS_POLICY,
|
|
1292
1292
|
title: 'Missing Security Header - Permissions-Policy',
|
|
1293
1293
|
description: 'The application does not implement Permissions-Policy (formerly Feature-Policy) header, allowing embedded frames or malicious scripts to access sensitive browser features like camera, microphone, geolocation, or payment APIs without explicit permission.',
|
|
@@ -1310,7 +1310,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1310
1310
|
},
|
|
1311
1311
|
|
|
1312
1312
|
[VulnerabilityCode.HEADER_MISSING_XSS_PROTECTION]: {
|
|
1313
|
-
id:
|
|
1313
|
+
id: 256,
|
|
1314
1314
|
code: VulnerabilityCode.HEADER_MISSING_XSS_PROTECTION,
|
|
1315
1315
|
title: 'Missing Security Header - X-XSS-Protection',
|
|
1316
1316
|
description: 'The legacy X-XSS-Protection header is not set. While deprecated in modern browsers, it can provide defense-in-depth for older browsers that still honor this header for their built-in XSS auditor feature.',
|
|
@@ -1333,7 +1333,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1333
1333
|
},
|
|
1334
1334
|
|
|
1335
1335
|
[VulnerabilityCode.HEADER_COEP_WITHOUT_COOP]: {
|
|
1336
|
-
id:
|
|
1336
|
+
id: 257,
|
|
1337
1337
|
code: VulnerabilityCode.HEADER_COEP_WITHOUT_COOP,
|
|
1338
1338
|
title: 'Header Misconfiguration - COEP Without COOP',
|
|
1339
1339
|
description: 'Cross-Origin-Embedder-Policy (COEP) is set without Cross-Origin-Opener-Policy (COOP), which can create inconsistent cross-origin isolation behavior and indicate incomplete or misapplied security header strategy for isolation-sensitive applications.',
|
|
@@ -1356,7 +1356,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1356
1356
|
},
|
|
1357
1357
|
|
|
1358
1358
|
[VulnerabilityCode.HEADER_CORP_UNUSUAL]: {
|
|
1359
|
-
id:
|
|
1359
|
+
id: 258,
|
|
1360
1360
|
code: VulnerabilityCode.HEADER_CORP_UNUSUAL,
|
|
1361
1361
|
title: 'Header Misconfiguration - Unusual CORP Value',
|
|
1362
1362
|
description: 'Cross-Origin-Resource-Policy (CORP) is set to a non-standard value, which may indicate a misconfiguration that provides no effective protection or creates unpredictable resource loading behavior across origins.',
|
|
@@ -1379,7 +1379,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1379
1379
|
},
|
|
1380
1380
|
|
|
1381
1381
|
[VulnerabilityCode.HEADER_EXPECT_CT_PRESENT]: {
|
|
1382
|
-
id:
|
|
1382
|
+
id: 259,
|
|
1383
1383
|
code: VulnerabilityCode.HEADER_EXPECT_CT_PRESENT,
|
|
1384
1384
|
title: 'Deprecated Header - Expect-CT Present',
|
|
1385
1385
|
description: 'The Expect-CT header is present even though the feature is deprecated and no longer enforced by major browsers, adding unnecessary configuration surface without meaningful security benefit.',
|
|
@@ -1402,7 +1402,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1402
1402
|
},
|
|
1403
1403
|
|
|
1404
1404
|
[VulnerabilityCode.HEADER_SERVER_HEADER_PRESENT]: {
|
|
1405
|
-
id:
|
|
1405
|
+
id: 260,
|
|
1406
1406
|
code: VulnerabilityCode.HEADER_SERVER_HEADER_PRESENT,
|
|
1407
1407
|
title: 'Information Exposure - Server Header Present',
|
|
1408
1408
|
description: 'The Server header reveals technology or version details that can assist attackers with fingerprinting and targeted exploitation, increasing the likelihood of tailored attacks against known software weaknesses.',
|
|
@@ -1425,7 +1425,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1425
1425
|
},
|
|
1426
1426
|
|
|
1427
1427
|
[VulnerabilityCode.HEADER_X_POWERED_BY_PRESENT]: {
|
|
1428
|
-
id:
|
|
1428
|
+
id: 261,
|
|
1429
1429
|
code: VulnerabilityCode.HEADER_X_POWERED_BY_PRESENT,
|
|
1430
1430
|
title: 'Information Exposure - X-Powered-By Present',
|
|
1431
1431
|
description: 'The X-Powered-By header discloses framework or runtime information that can be used to fingerprint the application stack and target known vulnerabilities in specific platforms or versions.',
|
|
@@ -1448,7 +1448,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1448
1448
|
},
|
|
1449
1449
|
|
|
1450
1450
|
[VulnerabilityCode.HEADER_X_XSS_PROTECTION_ENABLED]: {
|
|
1451
|
-
id:
|
|
1451
|
+
id: 262,
|
|
1452
1452
|
code: VulnerabilityCode.HEADER_X_XSS_PROTECTION_ENABLED,
|
|
1453
1453
|
title: 'Deprecated Header - X-XSS-Protection Enabled',
|
|
1454
1454
|
description: 'The X-XSS-Protection header is enabled, which is deprecated and can introduce security risks or inconsistent behavior in legacy browsers due to the removed XSS auditor feature.',
|
|
@@ -1471,7 +1471,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1471
1471
|
},
|
|
1472
1472
|
|
|
1473
1473
|
[VulnerabilityCode.COOKIE_SAMESITE_NONE_WITHOUT_SECURE]: {
|
|
1474
|
-
id:
|
|
1474
|
+
id: 263,
|
|
1475
1475
|
code: VulnerabilityCode.COOKIE_SAMESITE_NONE_WITHOUT_SECURE,
|
|
1476
1476
|
title: 'Cookie Misconfiguration - SameSite=None Without Secure',
|
|
1477
1477
|
description: 'A cookie is configured with SameSite=None but lacks the Secure attribute, enabling cross-site transmission over unencrypted connections and undermining cookie integrity and confidentiality controls.',
|
|
@@ -1494,7 +1494,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1494
1494
|
},
|
|
1495
1495
|
|
|
1496
1496
|
[VulnerabilityCode.COOKIE_SESSION_MISSING_SECURE]: {
|
|
1497
|
-
id:
|
|
1497
|
+
id: 264,
|
|
1498
1498
|
code: VulnerabilityCode.COOKIE_SESSION_MISSING_SECURE,
|
|
1499
1499
|
title: 'Cookie Misconfiguration - Session Cookie Missing Secure',
|
|
1500
1500
|
description: 'Session or authentication cookies are missing the Secure attribute, allowing them to be transmitted over unencrypted connections and increasing the risk of session hijacking or credential theft.',
|
|
@@ -1517,7 +1517,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1517
1517
|
},
|
|
1518
1518
|
|
|
1519
1519
|
[VulnerabilityCode.COOKIE_MISSING_SECURE]: {
|
|
1520
|
-
id:
|
|
1520
|
+
id: 265,
|
|
1521
1521
|
code: VulnerabilityCode.COOKIE_MISSING_SECURE,
|
|
1522
1522
|
title: 'Cookie Misconfiguration - Missing Secure Attribute',
|
|
1523
1523
|
description: 'Cookies are set without the Secure attribute, permitting transmission over plaintext HTTP and exposing cookie contents to network interception or manipulation.',
|
|
@@ -1540,7 +1540,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1540
1540
|
},
|
|
1541
1541
|
|
|
1542
1542
|
[VulnerabilityCode.COOKIE_SESSION_MISSING_HTTPONLY]: {
|
|
1543
|
-
id:
|
|
1543
|
+
id: 266,
|
|
1544
1544
|
code: VulnerabilityCode.COOKIE_SESSION_MISSING_HTTPONLY,
|
|
1545
1545
|
title: 'Cookie Misconfiguration - Session Cookie Missing HttpOnly',
|
|
1546
1546
|
description: 'Session or authentication cookies are missing the HttpOnly attribute, allowing client-side scripts to access sensitive cookie values and increasing the impact of XSS attacks.',
|
|
@@ -1563,7 +1563,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1563
1563
|
},
|
|
1564
1564
|
|
|
1565
1565
|
[VulnerabilityCode.COOKIE_MISSING_HTTPONLY]: {
|
|
1566
|
-
id:
|
|
1566
|
+
id: 267,
|
|
1567
1567
|
code: VulnerabilityCode.COOKIE_MISSING_HTTPONLY,
|
|
1568
1568
|
title: 'Cookie Misconfiguration - Missing HttpOnly Attribute',
|
|
1569
1569
|
description: 'Cookies are missing the HttpOnly attribute, allowing JavaScript access to cookie values and increasing the potential impact of client-side script injection.',
|
|
@@ -1586,7 +1586,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1586
1586
|
},
|
|
1587
1587
|
|
|
1588
1588
|
[VulnerabilityCode.COOKIE_MISSING_SAMESITE]: {
|
|
1589
|
-
id:
|
|
1589
|
+
id: 268,
|
|
1590
1590
|
code: VulnerabilityCode.COOKIE_MISSING_SAMESITE,
|
|
1591
1591
|
title: 'Cookie Misconfiguration - Missing SameSite Attribute',
|
|
1592
1592
|
description: 'Cookies do not specify SameSite, which can allow cross-site requests to include cookies by default and increase exposure to CSRF-style attacks or cross-site leakage.',
|
|
@@ -1609,7 +1609,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1609
1609
|
},
|
|
1610
1610
|
|
|
1611
1611
|
[VulnerabilityCode.COOKIE_HOST_PREFIX_INVALID]: {
|
|
1612
|
-
id:
|
|
1612
|
+
id: 269,
|
|
1613
1613
|
code: VulnerabilityCode.COOKIE_HOST_PREFIX_INVALID,
|
|
1614
1614
|
title: 'Cookie Misconfiguration - __Host- Prefix Violations',
|
|
1615
1615
|
description: 'Cookies with the __Host- prefix do not meet required attributes (Secure, Path=/, no Domain), weakening the protections provided by host-only cookie semantics.',
|
|
@@ -1632,7 +1632,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1632
1632
|
},
|
|
1633
1633
|
|
|
1634
1634
|
[VulnerabilityCode.COOKIE_SECURE_PREFIX_INVALID]: {
|
|
1635
|
-
id:
|
|
1635
|
+
id: 270,
|
|
1636
1636
|
code: VulnerabilityCode.COOKIE_SECURE_PREFIX_INVALID,
|
|
1637
1637
|
title: 'Cookie Misconfiguration - __Secure- Prefix Violations',
|
|
1638
1638
|
description: 'Cookies with the __Secure- prefix are missing the Secure attribute, which defeats the prefix requirement and weakens transport security protections.',
|
|
@@ -1655,7 +1655,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1655
1655
|
},
|
|
1656
1656
|
|
|
1657
1657
|
[VulnerabilityCode.HEADER_DRIFT_CSP]: {
|
|
1658
|
-
id:
|
|
1658
|
+
id: 271,
|
|
1659
1659
|
code: VulnerabilityCode.HEADER_DRIFT_CSP,
|
|
1660
1660
|
title: 'Header Drift - Content-Security-Policy Inconsistent',
|
|
1661
1661
|
description: 'Content-Security-Policy is present on some paths but missing on others, creating uneven defenses and potentially exposing unprotected routes to script injection or content loading risks.',
|
|
@@ -1678,7 +1678,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1678
1678
|
},
|
|
1679
1679
|
|
|
1680
1680
|
[VulnerabilityCode.HEADER_DRIFT_HSTS]: {
|
|
1681
|
-
id:
|
|
1681
|
+
id: 272,
|
|
1682
1682
|
code: VulnerabilityCode.HEADER_DRIFT_HSTS,
|
|
1683
1683
|
title: 'Header Drift - Strict-Transport-Security Inconsistent',
|
|
1684
1684
|
description: 'Strict-Transport-Security is present on some paths but missing on others, reducing the effectiveness of HTTPS enforcement and creating mixed transport behavior across the site.',
|
|
@@ -1701,7 +1701,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1701
1701
|
},
|
|
1702
1702
|
|
|
1703
1703
|
[VulnerabilityCode.HEADER_DRIFT_XCONTENT_TYPE]: {
|
|
1704
|
-
id:
|
|
1704
|
+
id: 273,
|
|
1705
1705
|
code: VulnerabilityCode.HEADER_DRIFT_XCONTENT_TYPE,
|
|
1706
1706
|
title: 'Header Drift - X-Content-Type-Options Inconsistent',
|
|
1707
1707
|
description: 'X-Content-Type-Options is present on some paths but missing on others, allowing inconsistent MIME sniffing behavior that could expose unprotected routes to content-type confusion.',
|
|
@@ -1724,7 +1724,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1724
1724
|
},
|
|
1725
1725
|
|
|
1726
1726
|
[VulnerabilityCode.HEADER_DRIFT_REFERRER_POLICY]: {
|
|
1727
|
-
id:
|
|
1727
|
+
id: 274,
|
|
1728
1728
|
code: VulnerabilityCode.HEADER_DRIFT_REFERRER_POLICY,
|
|
1729
1729
|
title: 'Header Drift - Referrer-Policy Inconsistent',
|
|
1730
1730
|
description: 'Referrer-Policy is present on some paths but missing on others, leading to inconsistent referrer leakage controls and potential exposure of sensitive URL data.',
|
|
@@ -1747,7 +1747,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1747
1747
|
},
|
|
1748
1748
|
|
|
1749
1749
|
[VulnerabilityCode.HEADER_DRIFT_XFRAME]: {
|
|
1750
|
-
id:
|
|
1750
|
+
id: 275,
|
|
1751
1751
|
code: VulnerabilityCode.HEADER_DRIFT_XFRAME,
|
|
1752
1752
|
title: 'Header Drift - X-Frame-Options Inconsistent',
|
|
1753
1753
|
description: 'X-Frame-Options or equivalent framing controls are present on some paths but missing on others, creating uneven clickjacking protection across the site.',
|
|
@@ -1770,7 +1770,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1770
1770
|
},
|
|
1771
1771
|
|
|
1772
1772
|
[VulnerabilityCode.HEADER_DRIFT_PERMISSIONS_POLICY]: {
|
|
1773
|
-
id:
|
|
1773
|
+
id: 276,
|
|
1774
1774
|
code: VulnerabilityCode.HEADER_DRIFT_PERMISSIONS_POLICY,
|
|
1775
1775
|
title: 'Header Drift - Permissions-Policy Inconsistent',
|
|
1776
1776
|
description: 'Permissions-Policy is present on some paths but missing on others, leading to inconsistent controls over browser features such as geolocation, camera, or microphone.',
|
|
@@ -1793,7 +1793,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1793
1793
|
},
|
|
1794
1794
|
|
|
1795
1795
|
[VulnerabilityCode.HEADER_DRIFT_COOP]: {
|
|
1796
|
-
id:
|
|
1796
|
+
id: 277,
|
|
1797
1797
|
code: VulnerabilityCode.HEADER_DRIFT_COOP,
|
|
1798
1798
|
title: 'Header Drift - COOP Inconsistent',
|
|
1799
1799
|
description: 'Cross-Origin-Opener-Policy is present on some paths but missing on others, which can lead to uneven cross-origin isolation guarantees and inconsistent window isolation behavior.',
|
|
@@ -1816,7 +1816,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1816
1816
|
},
|
|
1817
1817
|
|
|
1818
1818
|
[VulnerabilityCode.HEADER_DRIFT_COEP]: {
|
|
1819
|
-
id:
|
|
1819
|
+
id: 278,
|
|
1820
1820
|
code: VulnerabilityCode.HEADER_DRIFT_COEP,
|
|
1821
1821
|
title: 'Header Drift - COEP Inconsistent',
|
|
1822
1822
|
description: 'Cross-Origin-Embedder-Policy is present on some paths but missing on others, resulting in inconsistent embedding restrictions and cross-origin isolation posture.',
|
|
@@ -1839,7 +1839,7 @@ export const CONFIG_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
|
|
|
1839
1839
|
},
|
|
1840
1840
|
|
|
1841
1841
|
[VulnerabilityCode.HEADER_DRIFT_CORP]: {
|
|
1842
|
-
id:
|
|
1842
|
+
id: 279,
|
|
1843
1843
|
code: VulnerabilityCode.HEADER_DRIFT_CORP,
|
|
1844
1844
|
title: 'Header Drift - CORP Inconsistent',
|
|
1845
1845
|
description: 'Cross-Origin-Resource-Policy is present on some paths but missing on others, which can leave inconsistent controls on resource sharing and embedding across the application.',
|