@zerothreatai/vulnerability-registry 4.0.0 → 5.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/dist/categories/authentication.js +17 -17
  2. package/dist/categories/configuration.js +80 -80
  3. package/dist/categories/injection.js +34 -34
  4. package/dist/categories/sensitive-paths.js +84 -84
  5. package/dist/categories/ssrf.js +11 -11
  6. package/dist/categories/xss.js +15 -15
  7. package/dist-cjs/categories/authentication.js +17 -17
  8. package/dist-cjs/categories/configuration.js +80 -80
  9. package/dist-cjs/categories/injection.js +34 -34
  10. package/dist-cjs/categories/sensitive-paths.js +84 -84
  11. package/dist-cjs/categories/ssrf.js +11 -11
  12. package/dist-cjs/categories/xss.js +15 -15
  13. package/package.json +35 -32
  14. package/scripts/assign-ids.ts +105 -0
  15. package/scripts/check-duplicate-ids.ts +45 -0
  16. package/src/categories/authentication.ts +17 -17
  17. package/src/categories/configuration.ts +80 -80
  18. package/src/categories/injection.ts +34 -34
  19. package/src/categories/sensitive-paths.ts +84 -84
  20. package/src/categories/ssrf.ts +11 -11
  21. package/src/categories/xss.ts +15 -15
  22. package/src/id-registry.json +1235 -0
  23. package/src/categories/authentication.d.ts +0 -8
  24. package/src/categories/authentication.d.ts.map +0 -1
  25. package/src/categories/authentication.js +0 -392
  26. package/src/categories/authentication.js.map +0 -1
  27. package/src/categories/configuration.d.ts +0 -8
  28. package/src/categories/configuration.d.ts.map +0 -1
  29. package/src/categories/configuration.js +0 -1782
  30. package/src/categories/configuration.js.map +0 -1
  31. package/src/categories/injection.d.ts +0 -8
  32. package/src/categories/injection.d.ts.map +0 -1
  33. package/src/categories/injection.js +0 -781
  34. package/src/categories/injection.js.map +0 -1
  35. package/src/categories/sensitive-paths.d.ts +0 -9
  36. package/src/categories/sensitive-paths.d.ts.map +0 -1
  37. package/src/categories/sensitive-paths.js +0 -1872
  38. package/src/categories/sensitive-paths.js.map +0 -1
  39. package/src/categories/ssrf.d.ts +0 -8
  40. package/src/categories/ssrf.d.ts.map +0 -1
  41. package/src/categories/ssrf.js +0 -258
  42. package/src/categories/ssrf.js.map +0 -1
  43. package/src/categories/xss.d.ts +0 -7
  44. package/src/categories/xss.d.ts.map +0 -1
  45. package/src/categories/xss.js +0 -340
  46. package/src/categories/xss.js.map +0 -1
  47. package/src/error-codes.d.ts +0 -280
  48. package/src/error-codes.d.ts.map +0 -1
  49. package/src/error-codes.js +0 -350
  50. package/src/error-codes.js.map +0 -1
  51. package/src/index.d.ts +0 -60
  52. package/src/index.d.ts.map +0 -1
  53. package/src/index.js +0 -92
  54. package/src/index.js.map +0 -1
  55. package/src/types.d.ts +0 -88
  56. package/src/types.d.ts.map +0 -1
  57. package/src/types.js +0 -6
  58. package/src/types.js.map +0 -1
@@ -9,7 +9,7 @@ import type { VulnerabilityDefinition } from '../types.js';
9
9
 
10
10
  export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
11
11
  [VulnerabilityCode.SSRF_CLOUD_METADATA]: {
12
- id: 46,
12
+ id: 450,
13
13
  code: VulnerabilityCode.SSRF_CLOUD_METADATA,
14
14
  title: 'Server-Side Request Forgery - Cloud Metadata Access',
15
15
  description: 'Critical SSRF vulnerability enabling access to cloud provider metadata services (AWS IMDSv1, GCP, Azure) which expose sensitive information including IAM credentials, API tokens, and instance configuration that can lead to full cloud account compromise and lateral movement.',
@@ -32,7 +32,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
32
32
  },
33
33
 
34
34
  [VulnerabilityCode.SSRF_INTERNAL_SERVICE]: {
35
- id: 47,
35
+ id: 451,
36
36
  code: VulnerabilityCode.SSRF_INTERNAL_SERVICE,
37
37
  title: 'Server-Side Request Forgery - Internal Service Access',
38
38
  description: 'SSRF vulnerability allowing attackers to access internal network services that should not be reachable from the internet, including databases, admin panels, cache servers, and other infrastructure components protected only by network segmentation without authentication.',
@@ -55,7 +55,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
55
55
  },
56
56
 
57
57
  [VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING]: {
58
- id: 48,
58
+ id: 452,
59
59
  code: VulnerabilityCode.SSRF_PROTOCOL_SMUGGLING,
60
60
  title: 'Server-Side Request Forgery - Protocol Smuggling',
61
61
  description: 'SSRF vulnerability exploiting non-HTTP protocol handlers like file://, gopher://, dict://, or ftp:// to read local files, interact with internal services using raw TCP, or perform attacks that would not be possible through HTTP requests alone, significantly expanding impact scope.',
@@ -78,7 +78,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
78
78
  },
79
79
 
80
80
  [VulnerabilityCode.SSRF_BLIND_OOB]: {
81
- id: 49,
81
+ id: 453,
82
82
  code: VulnerabilityCode.SSRF_BLIND_OOB,
83
83
  title: 'Server-Side Request Forgery - Blind OOB',
84
84
  description: 'Blind SSRF vulnerability confirmed through out-of-band DNS or HTTP callbacks indicating the server makes requests to attacker-controlled destinations even though responses are not reflected, enabling internal network scanning and data exfiltration through DNS or timing side channels.',
@@ -104,7 +104,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
104
104
  // OPEN REDIRECT
105
105
  // ========================================
106
106
  [VulnerabilityCode.REDIRECT_HEADER_INJECTION]: {
107
- id: 50,
107
+ id: 454,
108
108
  code: VulnerabilityCode.REDIRECT_HEADER_INJECTION,
109
109
  title: 'Open Redirect - HTTP Header Injection',
110
110
  description: 'Open redirect vulnerability through Location header manipulation allowing attackers to redirect victims to malicious websites after authenticating or interacting with the legitimate application, facilitating phishing attacks that abuse user trust in the original domain.',
@@ -127,7 +127,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
127
127
  },
128
128
 
129
129
  [VulnerabilityCode.REDIRECT_JS_NAVIGATION]: {
130
- id: 51,
130
+ id: 455,
131
131
  code: VulnerabilityCode.REDIRECT_JS_NAVIGATION,
132
132
  title: 'Open Redirect - JavaScript Navigation',
133
133
  description: 'Client-side open redirect vulnerability through JavaScript navigation methods like window.location or location.href being set to user-controlled values, allowing attackers to redirect users to malicious sites through specially crafted URLs that bypass server-side validation.',
@@ -153,7 +153,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
153
153
  // HOST HEADER INJECTION
154
154
  // ========================================
155
155
  [VulnerabilityCode.HOST_CACHE_POISONING]: {
156
- id: 52,
156
+ id: 456,
157
157
  code: VulnerabilityCode.HOST_CACHE_POISONING,
158
158
  title: 'Host Header Injection - Cache Poisoning',
159
159
  description: 'Host header injection vulnerability where manipulated Host headers are reflected in cached responses, allowing attackers to poison web caches and CDNs with malicious content that is then served to all users, potentially enabling widespread defacement or malware distribution.',
@@ -176,7 +176,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
176
176
  },
177
177
 
178
178
  [VulnerabilityCode.HOST_PASSWORD_RESET]: {
179
- id: 53,
179
+ id: 457,
180
180
  code: VulnerabilityCode.HOST_PASSWORD_RESET,
181
181
  title: 'Host Header Injection - Password Reset Poisoning',
182
182
  description: 'Critical host header injection vulnerability in password reset functionality where the injected Host header is used to generate password reset URLs, allowing attackers to receive password reset tokens when victims click the manipulated links in legitimate reset emails.',
@@ -199,7 +199,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
199
199
  },
200
200
 
201
201
  [VulnerabilityCode.SSRF_FILTER_BYPASS]: {
202
- id: 54,
202
+ id: 458,
203
203
  code: VulnerabilityCode.SSRF_FILTER_BYPASS,
204
204
  title: 'Server-Side Request Forgery - Filter Bypass',
205
205
  description: 'SSRF vulnerability that bypasses security filters through encoding tricks (URL encoding, IPv6 representation, decimal IP notation), DNS rebinding, or using alternative representations of blocked addresses to reach internal resources despite URL validation controls.',
@@ -222,7 +222,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
222
222
  },
223
223
 
224
224
  [VulnerabilityCode.REDIRECT_META_REFRESH]: {
225
- id: 55,
225
+ id: 459,
226
226
  code: VulnerabilityCode.REDIRECT_META_REFRESH,
227
227
  title: 'Open Redirect - Meta Refresh',
228
228
  description: 'Open redirect vulnerability through HTML meta refresh tags where user input controls the redirect target URL, enabling phishing attacks by sending victims to malicious sites after a brief delay on the legitimate domain, bypassing some security controls.',
@@ -245,7 +245,7 @@ export const SSRF_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
245
245
  },
246
246
 
247
247
  [VulnerabilityCode.HOST_REDIRECT]: {
248
- id: 56,
248
+ id: 460,
249
249
  code: VulnerabilityCode.HOST_REDIRECT,
250
250
  title: 'Host Header Injection - Open Redirect',
251
251
  description: 'Host header injection leading to open redirect where the application uses the Host header to generate redirect URLs, allowing attackers to redirect users to malicious domains by manipulating the Host header in their requests.',
@@ -9,7 +9,7 @@ import type { VulnerabilityDefinition } from '../types.js';
9
9
 
10
10
  export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
11
11
  [VulnerabilityCode.XSS_REFLECTED]: {
12
- id: 31,
12
+ id: 400,
13
13
  code: VulnerabilityCode.XSS_REFLECTED,
14
14
  title: 'Cross-Site Scripting - Reflected',
15
15
  description: 'Reflected XSS vulnerability where user input is immediately returned by the server in the response without proper encoding, allowing attackers to inject malicious scripts that execute in the victim browser when they click a crafted link or submit a manipulated form.',
@@ -32,7 +32,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
32
32
  },
33
33
 
34
34
  [VulnerabilityCode.XSS_STORED]: {
35
- id: 32,
35
+ id: 401,
36
36
  code: VulnerabilityCode.XSS_STORED,
37
37
  title: 'Cross-Site Scripting - Stored',
38
38
  description: 'Critical stored XSS vulnerability where malicious scripts are permanently saved in the application database and served to all users who view the affected content, enabling widespread session hijacking, credential theft, and malware distribution without requiring victim interaction beyond normal usage.',
@@ -55,7 +55,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
55
55
  },
56
56
 
57
57
  [VulnerabilityCode.XSS_DOM_BASED]: {
58
- id: 33,
58
+ id: 402,
59
59
  code: VulnerabilityCode.XSS_DOM_BASED,
60
60
  title: 'Cross-Site Scripting - DOM Based',
61
61
  description: 'DOM-based XSS vulnerability where the attack payload is processed entirely in the client-side JavaScript code without being sent to the server, typically through dangerous sinks like innerHTML, document.write(), or eval() that process URL fragments or user-controlled DOM elements.',
@@ -78,7 +78,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
78
78
  },
79
79
 
80
80
  [VulnerabilityCode.XSS_SVG_INJECTION]: {
81
- id: 34,
81
+ id: 403,
82
82
  code: VulnerabilityCode.XSS_SVG_INJECTION,
83
83
  title: 'Cross-Site Scripting - SVG Injection',
84
84
  description: 'SVG-based XSS vulnerability where malicious JavaScript is embedded within SVG image files using script elements or event handlers like onload, which execute when the browser renders the SVG file as an image or inline element, bypassing image upload security controls.',
@@ -101,7 +101,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
101
101
  },
102
102
 
103
103
  [VulnerabilityCode.XSS_CSTI_ANGULAR]: {
104
- id: 35,
104
+ id: 404,
105
105
  code: VulnerabilityCode.XSS_CSTI_ANGULAR,
106
106
  title: 'Cross-Site Scripting - Angular Template Injection',
107
107
  description: 'AngularJS client-side template injection vulnerability where user input containing Angular expressions like {{constructor.constructor("alert(1)")()}} is evaluated by the Angular template engine, leading to arbitrary JavaScript execution in the user browser context.',
@@ -125,7 +125,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
125
125
  },
126
126
 
127
127
  [VulnerabilityCode.XSS_CSP_BYPASS]: {
128
- id: 36,
128
+ id: 405,
129
129
  code: VulnerabilityCode.XSS_CSP_BYPASS,
130
130
  title: 'Cross-Site Scripting - CSP Bypass',
131
131
  description: 'XSS vulnerability that bypasses Content Security Policy protections through techniques like JSONP endpoints on whitelisted domains, base tag injection, Angular.js libraries on CDN, or other CSP bypass gadgets that allow script execution despite CSP controls being in place.',
@@ -148,7 +148,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
148
148
  },
149
149
 
150
150
  [VulnerabilityCode.XSS_JS_CONTEXT]: {
151
- id: 37,
151
+ id: 406,
152
152
  code: VulnerabilityCode.XSS_JS_CONTEXT,
153
153
  title: 'Cross-Site Scripting - JavaScript Context',
154
154
  description: 'XSS vulnerability where user input is injected directly into JavaScript code blocks, allowing attackers to break out of string contexts and execute arbitrary JavaScript by injecting quote characters and script code, or modify application logic by injecting new statements.',
@@ -171,7 +171,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
171
171
  },
172
172
 
173
173
  [VulnerabilityCode.XSS_EVENT_HANDLER]: {
174
- id: 38,
174
+ id: 407,
175
175
  code: VulnerabilityCode.XSS_EVENT_HANDLER,
176
176
  title: 'Cross-Site Scripting - Event Handler Injection',
177
177
  description: 'XSS vulnerability through injection into HTML event handler attributes like onclick, onerror, onload, or onmouseover, allowing attackers to execute JavaScript when users interact with or simply view the affected page elements without requiring script tags.',
@@ -194,7 +194,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
194
194
  },
195
195
 
196
196
  [VulnerabilityCode.XSS_SCRIPT_INJECTION]: {
197
- id: 39,
197
+ id: 408,
198
198
  code: VulnerabilityCode.XSS_SCRIPT_INJECTION,
199
199
  title: 'Cross-Site Scripting - Script Tag Injection',
200
200
  description: 'XSS vulnerability where attackers can inject complete script tags into the HTML response, enabling arbitrary JavaScript execution. This is often the most straightforward XSS exploitation when input is not properly sanitized before rendering.',
@@ -217,7 +217,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
217
217
  },
218
218
 
219
219
  [VulnerabilityCode.XSS_HTML_INJECTION]: {
220
- id: 40,
220
+ id: 409,
221
221
  code: VulnerabilityCode.XSS_HTML_INJECTION,
222
222
  title: 'Cross-Site Scripting - HTML Injection',
223
223
  description: 'HTML injection vulnerability where attackers can inject arbitrary HTML elements that modify page structure, enabling phishing attacks through fake login forms, content spoofing, or combination with CSS to overlay malicious content over legitimate page elements.',
@@ -240,7 +240,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
240
240
  },
241
241
 
242
242
  [VulnerabilityCode.XSS_ATTRIBUTE_INJECTION]: {
243
- id: 41,
243
+ id: 410,
244
244
  code: VulnerabilityCode.XSS_ATTRIBUTE_INJECTION,
245
245
  title: 'Cross-Site Scripting - Attribute Injection',
246
246
  description: 'XSS vulnerability where user input is placed in HTML attributes without proper encoding, allowing attackers to break out of the attribute context and inject new attributes or event handlers by using quote characters and spaces.',
@@ -263,7 +263,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
263
263
  },
264
264
 
265
265
  [VulnerabilityCode.XSS_CSS_INJECTION]: {
266
- id: 42,
266
+ id: 411,
267
267
  code: VulnerabilityCode.XSS_CSS_INJECTION,
268
268
  title: 'Cross-Site Scripting - CSS Injection',
269
269
  description: 'CSS injection vulnerability where attackers can inject malicious CSS rules to exfiltrate data through CSS selectors and background URLs, modify page appearance for phishing, or in older browsers achieve JavaScript execution through CSS expressions.',
@@ -286,7 +286,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
286
286
  },
287
287
 
288
288
  [VulnerabilityCode.XSS_TEMPLATE_LITERAL]: {
289
- id: 43,
289
+ id: 412,
290
290
  code: VulnerabilityCode.XSS_TEMPLATE_LITERAL,
291
291
  title: 'Cross-Site Scripting - Template Literal Injection',
292
292
  description: 'XSS vulnerability through JavaScript template literals (backtick strings) where user input can break out of the template context or inject expressions using ${} syntax, executing arbitrary JavaScript in the client browser context.',
@@ -309,7 +309,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
309
309
  },
310
310
 
311
311
  [VulnerabilityCode.XSS_MUTATION_BASED]: {
312
- id: 44,
312
+ id: 413,
313
313
  code: VulnerabilityCode.XSS_MUTATION_BASED,
314
314
  title: 'Cross-Site Scripting - Mutation XSS',
315
315
  description: 'Mutation-based XSS (mXSS) vulnerability exploiting browser HTML parser quirks and DOM mutations where seemingly safe HTML is transformed into executable script through browser parsing behaviors, bypassing traditional sanitization.',
@@ -332,7 +332,7 @@ export const XSS_VULNERABILITIES: Record<string, VulnerabilityDefinition> = {
332
332
  },
333
333
 
334
334
  [VulnerabilityCode.XSS_CSTI_VUE]: {
335
- id: 45,
335
+ id: 414,
336
336
  code: VulnerabilityCode.XSS_CSTI_VUE,
337
337
  title: 'Cross-Site Scripting - Vue.js Template Injection',
338
338
  description: 'Vue.js client-side template injection vulnerability where user input containing Vue expression syntax like {{}} or v-bind directives is evaluated by the Vue template compiler, leading to arbitrary JavaScript execution in the browser context.',