@zerothreatai/vulnerability-registry 4.0.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +17 -17
- package/dist/categories/configuration.js +80 -80
- package/dist/categories/injection.js +34 -34
- package/dist/categories/sensitive-paths.js +84 -84
- package/dist/categories/ssrf.js +11 -11
- package/dist/categories/xss.js +15 -15
- package/dist-cjs/categories/authentication.js +17 -17
- package/dist-cjs/categories/configuration.js +80 -80
- package/dist-cjs/categories/injection.js +34 -34
- package/dist-cjs/categories/sensitive-paths.js +84 -84
- package/dist-cjs/categories/ssrf.js +11 -11
- package/dist-cjs/categories/xss.js +15 -15
- package/package.json +35 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +17 -17
- package/src/categories/configuration.ts +80 -80
- package/src/categories/injection.ts +34 -34
- package/src/categories/sensitive-paths.ts +84 -84
- package/src/categories/ssrf.ts +11 -11
- package/src/categories/xss.ts +15 -15
- package/src/id-registry.json +1235 -0
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -392
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -1782
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -781
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1872
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -258
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -340
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -280
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -350
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -92
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -88
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -6
- package/src/types.js.map +0 -1
|
@@ -12,7 +12,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
12
12
|
// SQL INJECTION
|
|
13
13
|
// ========================================
|
|
14
14
|
[VulnerabilityCode.SQLI_ERROR_BASED]: {
|
|
15
|
-
id:
|
|
15
|
+
id: 300,
|
|
16
16
|
code: VulnerabilityCode.SQLI_ERROR_BASED,
|
|
17
17
|
title: 'SQL Injection - Error Based',
|
|
18
18
|
description: 'Error-based SQL injection vulnerability detected where database error messages are reflected in the application response, allowing attackers to extract sensitive data from the database by manipulating SQL queries and analyzing error output.',
|
|
@@ -35,7 +35,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
35
35
|
},
|
|
36
36
|
|
|
37
37
|
[VulnerabilityCode.SQLI_BOOLEAN_BASED]: {
|
|
38
|
-
id:
|
|
38
|
+
id: 301,
|
|
39
39
|
code: VulnerabilityCode.SQLI_BOOLEAN_BASED,
|
|
40
40
|
title: 'SQL Injection - Boolean Based Blind',
|
|
41
41
|
description: 'Boolean-based blind SQL injection vulnerability where the application responds differently based on whether injected conditions evaluate to true or false, enabling attackers to infer database contents one bit at a time through systematic query manipulation.',
|
|
@@ -58,7 +58,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
58
58
|
},
|
|
59
59
|
|
|
60
60
|
[VulnerabilityCode.SQLI_TIME_BASED]: {
|
|
61
|
-
id:
|
|
61
|
+
id: 302,
|
|
62
62
|
code: VulnerabilityCode.SQLI_TIME_BASED,
|
|
63
63
|
title: 'SQL Injection - Time Based Blind',
|
|
64
64
|
description: 'Time-based blind SQL injection vulnerability where attackers can infer database contents by measuring response time differences caused by injected time delay functions like SLEEP() or WAITFOR, enabling complete database extraction through timing analysis.',
|
|
@@ -81,7 +81,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
81
81
|
},
|
|
82
82
|
|
|
83
83
|
[VulnerabilityCode.SQLI_STACK_BASED]: {
|
|
84
|
-
id:
|
|
84
|
+
id: 303,
|
|
85
85
|
code: VulnerabilityCode.SQLI_STACK_BASED,
|
|
86
86
|
title: 'SQL Injection - Stacked Queries',
|
|
87
87
|
description: 'Critical stacked queries SQL injection vulnerability allowing attackers to execute multiple SQL statements in a single query, enabling destructive operations like DROP TABLE, INSERT into admin tables, or creating backdoor accounts with full database control.',
|
|
@@ -104,7 +104,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
104
104
|
},
|
|
105
105
|
|
|
106
106
|
[VulnerabilityCode.SQLI_UNION_BASED]: {
|
|
107
|
-
id:
|
|
107
|
+
id: 304,
|
|
108
108
|
code: VulnerabilityCode.SQLI_UNION_BASED,
|
|
109
109
|
title: 'SQL Injection - UNION Based',
|
|
110
110
|
description: 'UNION-based SQL injection vulnerability allowing attackers to append additional SELECT queries using UNION operator, enabling direct extraction of data from other database tables including user credentials, personal information, and sensitive business data.',
|
|
@@ -130,7 +130,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
130
130
|
// COMMAND INJECTION
|
|
131
131
|
// ========================================
|
|
132
132
|
[VulnerabilityCode.CMDI_OOB_CONFIRMED]: {
|
|
133
|
-
id:
|
|
133
|
+
id: 305,
|
|
134
134
|
code: VulnerabilityCode.CMDI_OOB_CONFIRMED,
|
|
135
135
|
title: 'OS Command Injection - OOB Confirmed',
|
|
136
136
|
description: 'Critical OS command injection vulnerability confirmed through out-of-band callback detection, proving that attacker-controlled shell commands are being executed on the server operating system with full access to system resources and potential for complete server compromise.',
|
|
@@ -153,7 +153,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
153
153
|
},
|
|
154
154
|
|
|
155
155
|
[VulnerabilityCode.CMDI_REFLECTED]: {
|
|
156
|
-
id:
|
|
156
|
+
id: 306,
|
|
157
157
|
code: VulnerabilityCode.CMDI_REFLECTED,
|
|
158
158
|
title: 'OS Command Injection - Reflected Output',
|
|
159
159
|
description: 'OS command injection vulnerability confirmed by command output being reflected in the application response, indicating that shell commands execute on the server and their results are returned to the attacker for data exfiltration and system reconnaissance.',
|
|
@@ -176,7 +176,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
176
176
|
},
|
|
177
177
|
|
|
178
178
|
[VulnerabilityCode.CMDI_TIME_BASED]: {
|
|
179
|
-
id:
|
|
179
|
+
id: 307,
|
|
180
180
|
code: VulnerabilityCode.CMDI_TIME_BASED,
|
|
181
181
|
title: 'OS Command Injection - Time Based',
|
|
182
182
|
description: 'Time-based OS command injection vulnerability detected through measurable response time delays caused by injected sleep or ping commands, strongly indicating that shell commands execute on the server even though output is not directly visible in responses.',
|
|
@@ -199,7 +199,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
199
199
|
},
|
|
200
200
|
|
|
201
201
|
[VulnerabilityCode.CMDI_ERROR_BASED]: {
|
|
202
|
-
id:
|
|
202
|
+
id: 308,
|
|
203
203
|
code: VulnerabilityCode.CMDI_ERROR_BASED,
|
|
204
204
|
title: 'OS Command Injection - Error Based',
|
|
205
205
|
description: 'Potential OS command injection vulnerability indicated by distinctive error messages or system-level exceptions in the application response when malformed shell payloads are submitted, suggesting command execution attempts reach the operating system interpreter.',
|
|
@@ -225,7 +225,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
225
225
|
// SERVER-SIDE TEMPLATE INJECTION
|
|
226
226
|
// ========================================
|
|
227
227
|
[VulnerabilityCode.SSTI_JINJA2]: {
|
|
228
|
-
id:
|
|
228
|
+
id: 309,
|
|
229
229
|
code: VulnerabilityCode.SSTI_JINJA2,
|
|
230
230
|
title: 'Server-Side Template Injection - Jinja2',
|
|
231
231
|
description: 'Critical server-side template injection vulnerability in Jinja2 (Python/Flask) where user input is processed as template code, enabling attackers to execute arbitrary Python code on the server through template expressions like {{config}} or {{request.application.__globals__}}.',
|
|
@@ -248,7 +248,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
248
248
|
},
|
|
249
249
|
|
|
250
250
|
[VulnerabilityCode.SSTI_TWIG]: {
|
|
251
|
-
id:
|
|
251
|
+
id: 310,
|
|
252
252
|
code: VulnerabilityCode.SSTI_TWIG,
|
|
253
253
|
title: 'Server-Side Template Injection - Twig',
|
|
254
254
|
description: 'Critical server-side template injection vulnerability in Twig (PHP/Symfony) where user input is evaluated as template expressions, allowing attackers to execute arbitrary PHP code on the server through filter chains and object method invocations within template syntax.',
|
|
@@ -271,7 +271,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
271
271
|
},
|
|
272
272
|
|
|
273
273
|
[VulnerabilityCode.SSTI_FREEMARKER]: {
|
|
274
|
-
id:
|
|
274
|
+
id: 311,
|
|
275
275
|
code: VulnerabilityCode.SSTI_FREEMARKER,
|
|
276
276
|
title: 'Server-Side Template Injection - FreeMarker',
|
|
277
277
|
description: 'Critical server-side template injection vulnerability in FreeMarker (Java) where user-controlled data is interpreted as template directives, enabling remote code execution through Java class instantiation and method invocation via FreeMarker built-in expressions.',
|
|
@@ -294,7 +294,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
294
294
|
},
|
|
295
295
|
|
|
296
296
|
[VulnerabilityCode.SSTI_GENERIC]: {
|
|
297
|
-
id:
|
|
297
|
+
id: 312,
|
|
298
298
|
code: VulnerabilityCode.SSTI_GENERIC,
|
|
299
299
|
title: 'Server-Side Template Injection - Generic',
|
|
300
300
|
description: 'Server-side template injection vulnerability detected where user input is being processed by a template engine, potentially allowing code execution. The specific template engine could not be determined, but mathematical expression evaluation confirms server-side processing of user input.',
|
|
@@ -317,7 +317,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
317
317
|
},
|
|
318
318
|
|
|
319
319
|
[VulnerabilityCode.SSTI_VELOCITY]: {
|
|
320
|
-
id:
|
|
320
|
+
id: 313,
|
|
321
321
|
code: VulnerabilityCode.SSTI_VELOCITY,
|
|
322
322
|
title: 'Server-Side Template Injection - Velocity',
|
|
323
323
|
description: 'Critical server-side template injection vulnerability in Apache Velocity (Java) where user-controlled data is processed as template directives, enabling arbitrary Java code execution through Velocity Template Language expressions and class instantiation.',
|
|
@@ -340,7 +340,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
340
340
|
},
|
|
341
341
|
|
|
342
342
|
[VulnerabilityCode.SSTI_THYMELEAF]: {
|
|
343
|
-
id:
|
|
343
|
+
id: 314,
|
|
344
344
|
code: VulnerabilityCode.SSTI_THYMELEAF,
|
|
345
345
|
title: 'Server-Side Template Injection - Thymeleaf',
|
|
346
346
|
description: 'Critical server-side template injection vulnerability in Thymeleaf (Spring/Java) where user input is processed as template expressions, enabling remote code execution through SpEL (Spring Expression Language) injection in template attributes.',
|
|
@@ -363,7 +363,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
363
363
|
},
|
|
364
364
|
|
|
365
365
|
[VulnerabilityCode.SSTI_ERB]: {
|
|
366
|
-
id:
|
|
366
|
+
id: 315,
|
|
367
367
|
code: VulnerabilityCode.SSTI_ERB,
|
|
368
368
|
title: 'Server-Side Template Injection - ERB',
|
|
369
369
|
description: 'Critical server-side template injection vulnerability in ERB (Ruby on Rails) where user input is embedded in ERB templates and executed as Ruby code, enabling arbitrary system command execution and complete server compromise through Ruby runtime access.',
|
|
@@ -386,7 +386,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
386
386
|
},
|
|
387
387
|
|
|
388
388
|
[VulnerabilityCode.SSTI_EJS]: {
|
|
389
|
-
id:
|
|
389
|
+
id: 316,
|
|
390
390
|
code: VulnerabilityCode.SSTI_EJS,
|
|
391
391
|
title: 'Server-Side Template Injection - EJS',
|
|
392
392
|
description: 'Critical server-side template injection vulnerability in EJS (Node.js) where user-controlled data is processed as template code, allowing arbitrary JavaScript execution on the server through embedded JavaScript expressions and access to Node.js runtime.',
|
|
@@ -409,7 +409,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
409
409
|
},
|
|
410
410
|
|
|
411
411
|
[VulnerabilityCode.SSTI_PUG]: {
|
|
412
|
-
id:
|
|
412
|
+
id: 317,
|
|
413
413
|
code: VulnerabilityCode.SSTI_PUG,
|
|
414
414
|
title: 'Server-Side Template Injection - Pug/Jade',
|
|
415
415
|
description: 'Critical server-side template injection vulnerability in Pug (formerly Jade, Node.js) where user input is interpreted as template syntax, enabling arbitrary JavaScript code execution through Pug embedded code blocks and access to server-side Node.js environment.',
|
|
@@ -432,7 +432,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
432
432
|
},
|
|
433
433
|
|
|
434
434
|
[VulnerabilityCode.SSTI_SMARTY]: {
|
|
435
|
-
id:
|
|
435
|
+
id: 318,
|
|
436
436
|
code: VulnerabilityCode.SSTI_SMARTY,
|
|
437
437
|
title: 'Server-Side Template Injection - Smarty',
|
|
438
438
|
description: 'Critical server-side template injection vulnerability in Smarty (PHP) where user input is processed as template code, enabling arbitrary PHP code execution through Smarty tags and function calls that can lead to complete server compromise.',
|
|
@@ -455,7 +455,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
455
455
|
},
|
|
456
456
|
|
|
457
457
|
[VulnerabilityCode.SSTI_MAKO]: {
|
|
458
|
-
id:
|
|
458
|
+
id: 319,
|
|
459
459
|
code: VulnerabilityCode.SSTI_MAKO,
|
|
460
460
|
title: 'Server-Side Template Injection - Mako',
|
|
461
461
|
description: 'Critical server-side template injection vulnerability in Mako (Python) where user-controlled data is executed as template code, enabling arbitrary Python code execution through Mako expressions and full access to the Python runtime environment.',
|
|
@@ -481,7 +481,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
481
481
|
// XXE (XML EXTERNAL ENTITY) - Additional
|
|
482
482
|
// ========================================
|
|
483
483
|
[VulnerabilityCode.XXE_ERROR_BASED]: {
|
|
484
|
-
id:
|
|
484
|
+
id: 320,
|
|
485
485
|
code: VulnerabilityCode.XXE_ERROR_BASED,
|
|
486
486
|
title: 'XML External Entity Injection - Error Based',
|
|
487
487
|
description: 'Error-based XXE vulnerability where file contents can be extracted through parser error messages by crafting malformed external entities that include file data in error output, enabling data exfiltration even when direct output is not reflected.',
|
|
@@ -504,7 +504,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
504
504
|
},
|
|
505
505
|
|
|
506
506
|
[VulnerabilityCode.XXE_PARAMETER_ENTITY]: {
|
|
507
|
-
id:
|
|
507
|
+
id: 321,
|
|
508
508
|
code: VulnerabilityCode.XXE_PARAMETER_ENTITY,
|
|
509
509
|
title: 'XML External Entity Injection - Parameter Entity',
|
|
510
510
|
description: 'XXE vulnerability exploiting parameter entities in DTD declarations to exfiltrate data or perform SSRF attacks when regular external entities are blocked, by using percent-encoded entity references within the document type definition.',
|
|
@@ -530,7 +530,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
530
530
|
// LOCAL FILE INCLUSION - Additional
|
|
531
531
|
// ========================================
|
|
532
532
|
[VulnerabilityCode.LFI_FILTER_BYPASS]: {
|
|
533
|
-
id:
|
|
533
|
+
id: 322,
|
|
534
534
|
code: VulnerabilityCode.LFI_FILTER_BYPASS,
|
|
535
535
|
title: 'Local File Inclusion - Filter Bypass',
|
|
536
536
|
description: 'Local file inclusion vulnerability that bypasses input validation filters through encoding tricks (URL encoding, double encoding, null bytes), alternate path separators, or case manipulation to access files despite security controls.',
|
|
@@ -553,7 +553,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
553
553
|
},
|
|
554
554
|
|
|
555
555
|
[VulnerabilityCode.LFI_PROC_DISCLOSURE]: {
|
|
556
|
-
id:
|
|
556
|
+
id: 323,
|
|
557
557
|
code: VulnerabilityCode.LFI_PROC_DISCLOSURE,
|
|
558
558
|
title: 'Local File Inclusion - Process Information Disclosure',
|
|
559
559
|
description: 'LFI vulnerability enabling access to /proc filesystem on Linux systems, exposing process memory maps, environment variables with credentials, command line arguments, and other runtime information that can reveal secrets and aid further attacks.',
|
|
@@ -579,7 +579,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
579
579
|
// XXE (XML EXTERNAL ENTITY)
|
|
580
580
|
// ========================================
|
|
581
581
|
[VulnerabilityCode.XXE_CLASSIC]: {
|
|
582
|
-
id:
|
|
582
|
+
id: 324,
|
|
583
583
|
code: VulnerabilityCode.XXE_CLASSIC,
|
|
584
584
|
title: 'XML External Entity Injection - Classic',
|
|
585
585
|
description: 'Classic XXE vulnerability where external XML entities are processed by the parser, allowing attackers to read local files like /etc/passwd or application configuration files by defining external entities that reference file:// protocol URIs in the XML document type definition.',
|
|
@@ -602,7 +602,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
602
602
|
},
|
|
603
603
|
|
|
604
604
|
[VulnerabilityCode.XXE_BLIND]: {
|
|
605
|
-
id:
|
|
605
|
+
id: 325,
|
|
606
606
|
code: VulnerabilityCode.XXE_BLIND,
|
|
607
607
|
title: 'XML External Entity Injection - Blind',
|
|
608
608
|
description: 'Blind XXE vulnerability where external entities are processed but file contents are not directly returned in the response. Exploitation requires out-of-band techniques like error-based extraction or HTTP callbacks to exfiltrate data from the target server.',
|
|
@@ -625,7 +625,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
625
625
|
},
|
|
626
626
|
|
|
627
627
|
[VulnerabilityCode.XXE_OOB]: {
|
|
628
|
-
id:
|
|
628
|
+
id: 326,
|
|
629
629
|
code: VulnerabilityCode.XXE_OOB,
|
|
630
630
|
title: 'XML External Entity Injection - Out-of-Band',
|
|
631
631
|
description: 'Critical out-of-band XXE vulnerability confirmed through external HTTP/DNS callbacks, proving the XML parser fetches external resources. This enables data exfiltration through URL parameters and server-side request forgery attacks against internal network resources.',
|
|
@@ -652,7 +652,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
652
652
|
// LOCAL FILE INCLUSION
|
|
653
653
|
// ========================================
|
|
654
654
|
[VulnerabilityCode.LFI_PATH_TRAVERSAL]: {
|
|
655
|
-
id:
|
|
655
|
+
id: 327,
|
|
656
656
|
code: VulnerabilityCode.LFI_PATH_TRAVERSAL,
|
|
657
657
|
title: 'Local File Inclusion - Path Traversal',
|
|
658
658
|
description: 'Path traversal vulnerability allowing attackers to read arbitrary files on the server by manipulating file path parameters with directory traversal sequences like ../ to escape the intended directory and access sensitive system or application configuration files.',
|
|
@@ -676,7 +676,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
676
676
|
},
|
|
677
677
|
|
|
678
678
|
[VulnerabilityCode.LFI_SOURCE_DISCLOSURE]: {
|
|
679
|
-
id:
|
|
679
|
+
id: 328,
|
|
680
680
|
code: VulnerabilityCode.LFI_SOURCE_DISCLOSURE,
|
|
681
681
|
title: 'Local File Inclusion - Source Code Disclosure',
|
|
682
682
|
description: 'Critical source code disclosure vulnerability where application source files can be read through file inclusion, exposing proprietary code, hardcoded credentials, API keys, database connection strings, and security implementation details that facilitate further attacks.',
|
|
@@ -700,7 +700,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
700
700
|
},
|
|
701
701
|
|
|
702
702
|
[VulnerabilityCode.LFI_WRAPPER_PROTOCOL]: {
|
|
703
|
-
id:
|
|
703
|
+
id: 329,
|
|
704
704
|
code: VulnerabilityCode.LFI_WRAPPER_PROTOCOL,
|
|
705
705
|
title: 'Local File Inclusion - PHP Wrapper Protocol',
|
|
706
706
|
description: 'PHP wrapper protocol exploitation where filter or data wrappers like php://filter or php://input can be used to read source files as base64, write arbitrary files, or achieve remote code execution through deserialization when phar:// wrapper is enabled.',
|
|
@@ -723,7 +723,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
723
723
|
},
|
|
724
724
|
|
|
725
725
|
[VulnerabilityCode.XPATH_AUTH_BYPASS]: {
|
|
726
|
-
id:
|
|
726
|
+
id: 330,
|
|
727
727
|
code: VulnerabilityCode.XPATH_AUTH_BYPASS,
|
|
728
728
|
title: 'XPath Injection - Authentication Bypass',
|
|
729
729
|
description: 'XPath injection vulnerability where crafted input manipulates XPath queries to bypass authentication or authorization checks, allowing attackers to log in as other users or access protected resources without valid credentials.',
|
|
@@ -746,7 +746,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
746
746
|
},
|
|
747
747
|
|
|
748
748
|
[VulnerabilityCode.XPATH_DATA_EXTRACTION]: {
|
|
749
|
-
id:
|
|
749
|
+
id: 331,
|
|
750
750
|
code: VulnerabilityCode.XPATH_DATA_EXTRACTION,
|
|
751
751
|
title: 'XPath Injection - Data Extraction',
|
|
752
752
|
description: 'XPath injection vulnerability that allows attackers to read or enumerate sensitive XML data by manipulating query predicates, leading to disclosure of user data, configuration, or credentials stored in XML-backed systems.',
|
|
@@ -769,7 +769,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
769
769
|
},
|
|
770
770
|
|
|
771
771
|
[VulnerabilityCode.XPATH_BLIND]: {
|
|
772
|
-
id:
|
|
772
|
+
id: 332,
|
|
773
773
|
code: VulnerabilityCode.XPATH_BLIND,
|
|
774
774
|
title: 'XPath Injection - Blind',
|
|
775
775
|
description: 'Blind XPath injection vulnerability where attackers infer query results through boolean or timing differences, enabling gradual extraction of sensitive XML data despite no direct response output.',
|
|
@@ -792,7 +792,7 @@ export const INJECTION_VULNERABILITIES: Record<string, VulnerabilityDefinition>
|
|
|
792
792
|
},
|
|
793
793
|
|
|
794
794
|
[VulnerabilityCode.XPATH_ERROR_BASED]: {
|
|
795
|
-
id:
|
|
795
|
+
id: 333,
|
|
796
796
|
code: VulnerabilityCode.XPATH_ERROR_BASED,
|
|
797
797
|
title: 'XPath Injection - Error Based',
|
|
798
798
|
description: 'XPath injection vulnerability where malformed input triggers verbose error messages that reveal query structure or XML data, enabling attackers to craft precise XPath exploits or extract sensitive information.',
|