@zerothreatai/vulnerability-registry 4.0.0 → 6.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (99) hide show
  1. package/dist/categories/authentication.js +17 -17
  2. package/dist/categories/configuration.js +80 -80
  3. package/dist/categories/injection.js +34 -34
  4. package/dist/categories/sensitive-paths.js +84 -84
  5. package/dist/categories/ssrf.js +11 -11
  6. package/dist/categories/xss.js +15 -15
  7. package/dist/compliance-codes.d.ts +207 -0
  8. package/dist/compliance-codes.js +213 -0
  9. package/dist/compliances/gdpr.d.ts +2 -0
  10. package/dist/compliances/gdpr.js +252 -0
  11. package/dist/compliances/helpers.d.ts +6 -0
  12. package/dist/compliances/helpers.js +11 -0
  13. package/dist/compliances/hipaa.d.ts +2 -0
  14. package/dist/compliances/hipaa.js +187 -0
  15. package/dist/compliances/index.d.ts +5 -0
  16. package/dist/compliances/index.js +5 -0
  17. package/dist/compliances/owasp.d.ts +2 -0
  18. package/dist/compliances/owasp.js +127 -0
  19. package/dist/compliances/pci-dss.d.ts +2 -0
  20. package/dist/compliances/pci-dss.js +260 -0
  21. package/dist/compliances/sans-top-25.d.ts +2 -0
  22. package/dist/compliances/sans-top-25.js +242 -0
  23. package/dist/index.d.ts +7 -1
  24. package/dist/index.js +7 -1
  25. package/dist/types.d.ts +33 -0
  26. package/dist/types.js +11 -1
  27. package/dist-cjs/categories/authentication.js +17 -17
  28. package/dist-cjs/categories/configuration.js +80 -80
  29. package/dist-cjs/categories/injection.js +34 -34
  30. package/dist-cjs/categories/sensitive-paths.js +84 -84
  31. package/dist-cjs/categories/ssrf.js +11 -11
  32. package/dist-cjs/categories/xss.js +15 -15
  33. package/dist-cjs/compliance-codes.js +216 -0
  34. package/dist-cjs/compliances/gdpr.js +255 -0
  35. package/dist-cjs/compliances/helpers.js +19 -0
  36. package/dist-cjs/compliances/hipaa.js +190 -0
  37. package/dist-cjs/compliances/index.js +13 -0
  38. package/dist-cjs/compliances/owasp.js +130 -0
  39. package/dist-cjs/compliances/pci-dss.js +263 -0
  40. package/dist-cjs/compliances/sans-top-25.js +245 -0
  41. package/dist-cjs/index.js +12 -1
  42. package/dist-cjs/types.js +12 -0
  43. package/package.json +40 -32
  44. package/scripts/assign-ids.ts +105 -0
  45. package/scripts/check-duplicate-ids.ts +45 -0
  46. package/src/categories/authentication.ts +17 -17
  47. package/src/categories/configuration.ts +80 -80
  48. package/src/categories/injection.ts +34 -34
  49. package/src/categories/sensitive-paths.ts +84 -84
  50. package/src/categories/ssrf.ts +11 -11
  51. package/src/categories/xss.ts +15 -15
  52. package/src/compliance-codes.ts +216 -0
  53. package/src/compliances/README.md +82 -0
  54. package/src/compliances/gdpr.ts +258 -0
  55. package/src/compliances/helpers.ts +29 -0
  56. package/src/compliances/hipaa.ts +193 -0
  57. package/src/compliances/index.ts +5 -0
  58. package/src/compliances/owasp.ts +133 -0
  59. package/src/compliances/pci-dss.ts +266 -0
  60. package/src/compliances/sans-top-25.ts +246 -0
  61. package/src/id-registry.json +1235 -0
  62. package/src/index.ts +12 -1
  63. package/src/types.ts +40 -4
  64. package/src/categories/authentication.d.ts +0 -8
  65. package/src/categories/authentication.d.ts.map +0 -1
  66. package/src/categories/authentication.js +0 -392
  67. package/src/categories/authentication.js.map +0 -1
  68. package/src/categories/configuration.d.ts +0 -8
  69. package/src/categories/configuration.d.ts.map +0 -1
  70. package/src/categories/configuration.js +0 -1782
  71. package/src/categories/configuration.js.map +0 -1
  72. package/src/categories/injection.d.ts +0 -8
  73. package/src/categories/injection.d.ts.map +0 -1
  74. package/src/categories/injection.js +0 -781
  75. package/src/categories/injection.js.map +0 -1
  76. package/src/categories/sensitive-paths.d.ts +0 -9
  77. package/src/categories/sensitive-paths.d.ts.map +0 -1
  78. package/src/categories/sensitive-paths.js +0 -1872
  79. package/src/categories/sensitive-paths.js.map +0 -1
  80. package/src/categories/ssrf.d.ts +0 -8
  81. package/src/categories/ssrf.d.ts.map +0 -1
  82. package/src/categories/ssrf.js +0 -258
  83. package/src/categories/ssrf.js.map +0 -1
  84. package/src/categories/xss.d.ts +0 -7
  85. package/src/categories/xss.d.ts.map +0 -1
  86. package/src/categories/xss.js +0 -340
  87. package/src/categories/xss.js.map +0 -1
  88. package/src/error-codes.d.ts +0 -280
  89. package/src/error-codes.d.ts.map +0 -1
  90. package/src/error-codes.js +0 -350
  91. package/src/error-codes.js.map +0 -1
  92. package/src/index.d.ts +0 -60
  93. package/src/index.d.ts.map +0 -1
  94. package/src/index.js +0 -92
  95. package/src/index.js.map +0 -1
  96. package/src/types.d.ts +0 -88
  97. package/src/types.d.ts.map +0 -1
  98. package/src/types.js +0 -6
  99. package/src/types.js.map +0 -1
@@ -12,7 +12,7 @@ exports.INJECTION_VULNERABILITIES = {
12
12
  // SQL INJECTION
13
13
  // ========================================
14
14
  [error_codes_js_1.VulnerabilityCode.SQLI_ERROR_BASED]: {
15
- id: 1,
15
+ id: 300,
16
16
  code: error_codes_js_1.VulnerabilityCode.SQLI_ERROR_BASED,
17
17
  title: 'SQL Injection - Error Based',
18
18
  description: 'Error-based SQL injection vulnerability detected where database error messages are reflected in the application response, allowing attackers to extract sensitive data from the database by manipulating SQL queries and analyzing error output.',
@@ -34,7 +34,7 @@ exports.INJECTION_VULNERABILITIES = {
34
34
  remediation: 'Use parameterized queries or prepared statements. Implement input validation and sanitization. Use stored procedures with parameterized inputs. Apply principle of least privilege to database accounts.',
35
35
  },
36
36
  [error_codes_js_1.VulnerabilityCode.SQLI_BOOLEAN_BASED]: {
37
- id: 2,
37
+ id: 301,
38
38
  code: error_codes_js_1.VulnerabilityCode.SQLI_BOOLEAN_BASED,
39
39
  title: 'SQL Injection - Boolean Based Blind',
40
40
  description: 'Boolean-based blind SQL injection vulnerability where the application responds differently based on whether injected conditions evaluate to true or false, enabling attackers to infer database contents one bit at a time through systematic query manipulation.',
@@ -56,7 +56,7 @@ exports.INJECTION_VULNERABILITIES = {
56
56
  remediation: 'Use parameterized queries or prepared statements. Implement consistent error handling that does not reveal query success/failure. Apply input validation and output encoding.',
57
57
  },
58
58
  [error_codes_js_1.VulnerabilityCode.SQLI_TIME_BASED]: {
59
- id: 3,
59
+ id: 302,
60
60
  code: error_codes_js_1.VulnerabilityCode.SQLI_TIME_BASED,
61
61
  title: 'SQL Injection - Time Based Blind',
62
62
  description: 'Time-based blind SQL injection vulnerability where attackers can infer database contents by measuring response time differences caused by injected time delay functions like SLEEP() or WAITFOR, enabling complete database extraction through timing analysis.',
@@ -78,7 +78,7 @@ exports.INJECTION_VULNERABILITIES = {
78
78
  remediation: 'Use parameterized queries or prepared statements. Implement query timeout limits. Apply input validation and sanitization. Monitor for abnormally slow queries.',
79
79
  },
80
80
  [error_codes_js_1.VulnerabilityCode.SQLI_STACK_BASED]: {
81
- id: 4,
81
+ id: 303,
82
82
  code: error_codes_js_1.VulnerabilityCode.SQLI_STACK_BASED,
83
83
  title: 'SQL Injection - Stacked Queries',
84
84
  description: 'Critical stacked queries SQL injection vulnerability allowing attackers to execute multiple SQL statements in a single query, enabling destructive operations like DROP TABLE, INSERT into admin tables, or creating backdoor accounts with full database control.',
@@ -100,7 +100,7 @@ exports.INJECTION_VULNERABILITIES = {
100
100
  remediation: 'Use parameterized queries exclusively. Disable multi-statement execution in database drivers. Implement strict input validation. Apply least privilege database permissions and prevent DDL execution.',
101
101
  },
102
102
  [error_codes_js_1.VulnerabilityCode.SQLI_UNION_BASED]: {
103
- id: 5,
103
+ id: 304,
104
104
  code: error_codes_js_1.VulnerabilityCode.SQLI_UNION_BASED,
105
105
  title: 'SQL Injection - UNION Based',
106
106
  description: 'UNION-based SQL injection vulnerability allowing attackers to append additional SELECT queries using UNION operator, enabling direct extraction of data from other database tables including user credentials, personal information, and sensitive business data.',
@@ -125,7 +125,7 @@ exports.INJECTION_VULNERABILITIES = {
125
125
  // COMMAND INJECTION
126
126
  // ========================================
127
127
  [error_codes_js_1.VulnerabilityCode.CMDI_OOB_CONFIRMED]: {
128
- id: 6,
128
+ id: 305,
129
129
  code: error_codes_js_1.VulnerabilityCode.CMDI_OOB_CONFIRMED,
130
130
  title: 'OS Command Injection - OOB Confirmed',
131
131
  description: 'Critical OS command injection vulnerability confirmed through out-of-band callback detection, proving that attacker-controlled shell commands are being executed on the server operating system with full access to system resources and potential for complete server compromise.',
@@ -147,7 +147,7 @@ exports.INJECTION_VULNERABILITIES = {
147
147
  remediation: 'Avoid system calls with user input entirely. Use language-specific APIs instead of shell commands. Implement strict input validation with allowlists. Run applications with minimal OS privileges in sandboxed environments.',
148
148
  },
149
149
  [error_codes_js_1.VulnerabilityCode.CMDI_REFLECTED]: {
150
- id: 7,
150
+ id: 306,
151
151
  code: error_codes_js_1.VulnerabilityCode.CMDI_REFLECTED,
152
152
  title: 'OS Command Injection - Reflected Output',
153
153
  description: 'OS command injection vulnerability confirmed by command output being reflected in the application response, indicating that shell commands execute on the server and their results are returned to the attacker for data exfiltration and system reconnaissance.',
@@ -169,7 +169,7 @@ exports.INJECTION_VULNERABILITIES = {
169
169
  remediation: 'Replace shell command execution with native language APIs. Implement strict input validation using allowlists. Escape shell metacharacters if commands are unavoidable. Sandbox application execution environments.',
170
170
  },
171
171
  [error_codes_js_1.VulnerabilityCode.CMDI_TIME_BASED]: {
172
- id: 8,
172
+ id: 307,
173
173
  code: error_codes_js_1.VulnerabilityCode.CMDI_TIME_BASED,
174
174
  title: 'OS Command Injection - Time Based',
175
175
  description: 'Time-based OS command injection vulnerability detected through measurable response time delays caused by injected sleep or ping commands, strongly indicating that shell commands execute on the server even though output is not directly visible in responses.',
@@ -191,7 +191,7 @@ exports.INJECTION_VULNERABILITIES = {
191
191
  remediation: 'Avoid executing system commands with user input. Use native APIs for required functionality. Implement strict input validation. Set command execution timeouts and monitor for anomalous delays.',
192
192
  },
193
193
  [error_codes_js_1.VulnerabilityCode.CMDI_ERROR_BASED]: {
194
- id: 9,
194
+ id: 308,
195
195
  code: error_codes_js_1.VulnerabilityCode.CMDI_ERROR_BASED,
196
196
  title: 'OS Command Injection - Error Based',
197
197
  description: 'Potential OS command injection vulnerability indicated by distinctive error messages or system-level exceptions in the application response when malformed shell payloads are submitted, suggesting command execution attempts reach the operating system interpreter.',
@@ -216,7 +216,7 @@ exports.INJECTION_VULNERABILITIES = {
216
216
  // SERVER-SIDE TEMPLATE INJECTION
217
217
  // ========================================
218
218
  [error_codes_js_1.VulnerabilityCode.SSTI_JINJA2]: {
219
- id: 10,
219
+ id: 309,
220
220
  code: error_codes_js_1.VulnerabilityCode.SSTI_JINJA2,
221
221
  title: 'Server-Side Template Injection - Jinja2',
222
222
  description: 'Critical server-side template injection vulnerability in Jinja2 (Python/Flask) where user input is processed as template code, enabling attackers to execute arbitrary Python code on the server through template expressions like {{config}} or {{request.application.__globals__}}.',
@@ -238,7 +238,7 @@ exports.INJECTION_VULNERABILITIES = {
238
238
  remediation: 'Never pass user input directly to template rendering. Use sandboxed template environments with restricted builtins. Prefer logic-less templates like Mustache. Implement strict input validation before template processing.',
239
239
  },
240
240
  [error_codes_js_1.VulnerabilityCode.SSTI_TWIG]: {
241
- id: 11,
241
+ id: 310,
242
242
  code: error_codes_js_1.VulnerabilityCode.SSTI_TWIG,
243
243
  title: 'Server-Side Template Injection - Twig',
244
244
  description: 'Critical server-side template injection vulnerability in Twig (PHP/Symfony) where user input is evaluated as template expressions, allowing attackers to execute arbitrary PHP code on the server through filter chains and object method invocations within template syntax.',
@@ -260,7 +260,7 @@ exports.INJECTION_VULNERABILITIES = {
260
260
  remediation: 'Avoid rendering user input as templates. Use Twig sandbox mode with whitelisted tags, filters, and functions. Upgrade to latest Twig version with security patches. Validate and sanitize all inputs.',
261
261
  },
262
262
  [error_codes_js_1.VulnerabilityCode.SSTI_FREEMARKER]: {
263
- id: 12,
263
+ id: 311,
264
264
  code: error_codes_js_1.VulnerabilityCode.SSTI_FREEMARKER,
265
265
  title: 'Server-Side Template Injection - FreeMarker',
266
266
  description: 'Critical server-side template injection vulnerability in FreeMarker (Java) where user-controlled data is interpreted as template directives, enabling remote code execution through Java class instantiation and method invocation via FreeMarker built-in expressions.',
@@ -282,7 +282,7 @@ exports.INJECTION_VULNERABILITIES = {
282
282
  remediation: 'Never interpolate user input into templates. Configure FreeMarker with restricted class resolver. Disable new() built-in and api built-ins. Use template configuration to restrict available classes.',
283
283
  },
284
284
  [error_codes_js_1.VulnerabilityCode.SSTI_GENERIC]: {
285
- id: 13,
285
+ id: 312,
286
286
  code: error_codes_js_1.VulnerabilityCode.SSTI_GENERIC,
287
287
  title: 'Server-Side Template Injection - Generic',
288
288
  description: 'Server-side template injection vulnerability detected where user input is being processed by a template engine, potentially allowing code execution. The specific template engine could not be determined, but mathematical expression evaluation confirms server-side processing of user input.',
@@ -304,7 +304,7 @@ exports.INJECTION_VULNERABILITIES = {
304
304
  remediation: 'Identify the template engine in use and apply engine-specific mitigations. Never pass user input to template rendering. Use sandboxed template environments. Implement strict input validation.',
305
305
  },
306
306
  [error_codes_js_1.VulnerabilityCode.SSTI_VELOCITY]: {
307
- id: 14,
307
+ id: 313,
308
308
  code: error_codes_js_1.VulnerabilityCode.SSTI_VELOCITY,
309
309
  title: 'Server-Side Template Injection - Velocity',
310
310
  description: 'Critical server-side template injection vulnerability in Apache Velocity (Java) where user-controlled data is processed as template directives, enabling arbitrary Java code execution through Velocity Template Language expressions and class instantiation.',
@@ -326,7 +326,7 @@ exports.INJECTION_VULNERABILITIES = {
326
326
  remediation: 'Never render user input as Velocity templates. Configure SecureUberspector to block dangerous method calls. Use Velocity tools with restricted capabilities. Apply input validation.',
327
327
  },
328
328
  [error_codes_js_1.VulnerabilityCode.SSTI_THYMELEAF]: {
329
- id: 15,
329
+ id: 314,
330
330
  code: error_codes_js_1.VulnerabilityCode.SSTI_THYMELEAF,
331
331
  title: 'Server-Side Template Injection - Thymeleaf',
332
332
  description: 'Critical server-side template injection vulnerability in Thymeleaf (Spring/Java) where user input is processed as template expressions, enabling remote code execution through SpEL (Spring Expression Language) injection in template attributes.',
@@ -348,7 +348,7 @@ exports.INJECTION_VULNERABILITIES = {
348
348
  remediation: 'Never concatenate user input into template expressions. Use th:text for displaying user data. Configure SpringTemplateEngine to restrict expression capabilities.',
349
349
  },
350
350
  [error_codes_js_1.VulnerabilityCode.SSTI_ERB]: {
351
- id: 16,
351
+ id: 315,
352
352
  code: error_codes_js_1.VulnerabilityCode.SSTI_ERB,
353
353
  title: 'Server-Side Template Injection - ERB',
354
354
  description: 'Critical server-side template injection vulnerability in ERB (Ruby on Rails) where user input is embedded in ERB templates and executed as Ruby code, enabling arbitrary system command execution and complete server compromise through Ruby runtime access.',
@@ -370,7 +370,7 @@ exports.INJECTION_VULNERABILITIES = {
370
370
  remediation: 'Never pass user input to ERB.new(). Use Rails html_safe only after proper sanitization. Prefer logic-less templates. Implement strict input validation before any rendering.',
371
371
  },
372
372
  [error_codes_js_1.VulnerabilityCode.SSTI_EJS]: {
373
- id: 17,
373
+ id: 316,
374
374
  code: error_codes_js_1.VulnerabilityCode.SSTI_EJS,
375
375
  title: 'Server-Side Template Injection - EJS',
376
376
  description: 'Critical server-side template injection vulnerability in EJS (Node.js) where user-controlled data is processed as template code, allowing arbitrary JavaScript execution on the server through embedded JavaScript expressions and access to Node.js runtime.',
@@ -392,7 +392,7 @@ exports.INJECTION_VULNERABILITIES = {
392
392
  remediation: 'Never pass user input directly to ejs.render(). Use ejs.escape() for user data. Pass data through template locals only. Consider switching to logic-less templates like Handlebars.',
393
393
  },
394
394
  [error_codes_js_1.VulnerabilityCode.SSTI_PUG]: {
395
- id: 18,
395
+ id: 317,
396
396
  code: error_codes_js_1.VulnerabilityCode.SSTI_PUG,
397
397
  title: 'Server-Side Template Injection - Pug/Jade',
398
398
  description: 'Critical server-side template injection vulnerability in Pug (formerly Jade, Node.js) where user input is interpreted as template syntax, enabling arbitrary JavaScript code execution through Pug embedded code blocks and access to server-side Node.js environment.',
@@ -414,7 +414,7 @@ exports.INJECTION_VULNERABILITIES = {
414
414
  remediation: 'Never compile user input as Pug templates. Pass user data only through template locals. Avoid pug.compile() with user-controlled template strings. Use static templates only.',
415
415
  },
416
416
  [error_codes_js_1.VulnerabilityCode.SSTI_SMARTY]: {
417
- id: 19,
417
+ id: 318,
418
418
  code: error_codes_js_1.VulnerabilityCode.SSTI_SMARTY,
419
419
  title: 'Server-Side Template Injection - Smarty',
420
420
  description: 'Critical server-side template injection vulnerability in Smarty (PHP) where user input is processed as template code, enabling arbitrary PHP code execution through Smarty tags and function calls that can lead to complete server compromise.',
@@ -436,7 +436,7 @@ exports.INJECTION_VULNERABILITIES = {
436
436
  remediation: 'Enable Smarty security_policy to restrict allowed tags and modifiers. Never pass user input to template compilation. Disable {php} tags. Use Smarty 3+ with security features enabled.',
437
437
  },
438
438
  [error_codes_js_1.VulnerabilityCode.SSTI_MAKO]: {
439
- id: 20,
439
+ id: 319,
440
440
  code: error_codes_js_1.VulnerabilityCode.SSTI_MAKO,
441
441
  title: 'Server-Side Template Injection - Mako',
442
442
  description: 'Critical server-side template injection vulnerability in Mako (Python) where user-controlled data is executed as template code, enabling arbitrary Python code execution through Mako expressions and full access to the Python runtime environment.',
@@ -461,7 +461,7 @@ exports.INJECTION_VULNERABILITIES = {
461
461
  // XXE (XML EXTERNAL ENTITY) - Additional
462
462
  // ========================================
463
463
  [error_codes_js_1.VulnerabilityCode.XXE_ERROR_BASED]: {
464
- id: 21,
464
+ id: 320,
465
465
  code: error_codes_js_1.VulnerabilityCode.XXE_ERROR_BASED,
466
466
  title: 'XML External Entity Injection - Error Based',
467
467
  description: 'Error-based XXE vulnerability where file contents can be extracted through parser error messages by crafting malformed external entities that include file data in error output, enabling data exfiltration even when direct output is not reflected.',
@@ -483,7 +483,7 @@ exports.INJECTION_VULNERABILITIES = {
483
483
  remediation: 'Disable DTD processing entirely in XML parser configuration. Suppress detailed error messages in production. Implement custom error handlers that do not expose file contents.',
484
484
  },
485
485
  [error_codes_js_1.VulnerabilityCode.XXE_PARAMETER_ENTITY]: {
486
- id: 22,
486
+ id: 321,
487
487
  code: error_codes_js_1.VulnerabilityCode.XXE_PARAMETER_ENTITY,
488
488
  title: 'XML External Entity Injection - Parameter Entity',
489
489
  description: 'XXE vulnerability exploiting parameter entities in DTD declarations to exfiltrate data or perform SSRF attacks when regular external entities are blocked, by using percent-encoded entity references within the document type definition.',
@@ -508,7 +508,7 @@ exports.INJECTION_VULNERABILITIES = {
508
508
  // LOCAL FILE INCLUSION - Additional
509
509
  // ========================================
510
510
  [error_codes_js_1.VulnerabilityCode.LFI_FILTER_BYPASS]: {
511
- id: 23,
511
+ id: 322,
512
512
  code: error_codes_js_1.VulnerabilityCode.LFI_FILTER_BYPASS,
513
513
  title: 'Local File Inclusion - Filter Bypass',
514
514
  description: 'Local file inclusion vulnerability that bypasses input validation filters through encoding tricks (URL encoding, double encoding, null bytes), alternate path separators, or case manipulation to access files despite security controls.',
@@ -530,7 +530,7 @@ exports.INJECTION_VULNERABILITIES = {
530
530
  remediation: 'Use canonicalization after decoding before validation. Implement allowlist of permitted files instead of blocklist. Validate resolved paths are within expected directories.',
531
531
  },
532
532
  [error_codes_js_1.VulnerabilityCode.LFI_PROC_DISCLOSURE]: {
533
- id: 24,
533
+ id: 323,
534
534
  code: error_codes_js_1.VulnerabilityCode.LFI_PROC_DISCLOSURE,
535
535
  title: 'Local File Inclusion - Process Information Disclosure',
536
536
  description: 'LFI vulnerability enabling access to /proc filesystem on Linux systems, exposing process memory maps, environment variables with credentials, command line arguments, and other runtime information that can reveal secrets and aid further attacks.',
@@ -555,7 +555,7 @@ exports.INJECTION_VULNERABILITIES = {
555
555
  // XXE (XML EXTERNAL ENTITY)
556
556
  // ========================================
557
557
  [error_codes_js_1.VulnerabilityCode.XXE_CLASSIC]: {
558
- id: 25,
558
+ id: 324,
559
559
  code: error_codes_js_1.VulnerabilityCode.XXE_CLASSIC,
560
560
  title: 'XML External Entity Injection - Classic',
561
561
  description: 'Classic XXE vulnerability where external XML entities are processed by the parser, allowing attackers to read local files like /etc/passwd or application configuration files by defining external entities that reference file:// protocol URIs in the XML document type definition.',
@@ -577,7 +577,7 @@ exports.INJECTION_VULNERABILITIES = {
577
577
  remediation: 'Disable DTD processing entirely. Disable external entity resolution in XML parser configuration. Use less complex data formats like JSON where possible. Validate and sanitize XML input.',
578
578
  },
579
579
  [error_codes_js_1.VulnerabilityCode.XXE_BLIND]: {
580
- id: 26,
580
+ id: 325,
581
581
  code: error_codes_js_1.VulnerabilityCode.XXE_BLIND,
582
582
  title: 'XML External Entity Injection - Blind',
583
583
  description: 'Blind XXE vulnerability where external entities are processed but file contents are not directly returned in the response. Exploitation requires out-of-band techniques like error-based extraction or HTTP callbacks to exfiltrate data from the target server.',
@@ -599,7 +599,7 @@ exports.INJECTION_VULNERABILITIES = {
599
599
  remediation: 'Disable DTD and external entity processing in XML parser. Block outbound network connections from XML processing servers. Use JSON instead of XML where possible.',
600
600
  },
601
601
  [error_codes_js_1.VulnerabilityCode.XXE_OOB]: {
602
- id: 27,
602
+ id: 326,
603
603
  code: error_codes_js_1.VulnerabilityCode.XXE_OOB,
604
604
  title: 'XML External Entity Injection - Out-of-Band',
605
605
  description: 'Critical out-of-band XXE vulnerability confirmed through external HTTP/DNS callbacks, proving the XML parser fetches external resources. This enables data exfiltration through URL parameters and server-side request forgery attacks against internal network resources.',
@@ -625,7 +625,7 @@ exports.INJECTION_VULNERABILITIES = {
625
625
  // LOCAL FILE INCLUSION
626
626
  // ========================================
627
627
  [error_codes_js_1.VulnerabilityCode.LFI_PATH_TRAVERSAL]: {
628
- id: 28,
628
+ id: 327,
629
629
  code: error_codes_js_1.VulnerabilityCode.LFI_PATH_TRAVERSAL,
630
630
  title: 'Local File Inclusion - Path Traversal',
631
631
  description: 'Path traversal vulnerability allowing attackers to read arbitrary files on the server by manipulating file path parameters with directory traversal sequences like ../ to escape the intended directory and access sensitive system or application configuration files.',
@@ -648,7 +648,7 @@ exports.INJECTION_VULNERABILITIES = {
648
648
  remediation: 'Validate all file path inputs against an allowlist of permitted files. Canonicalize paths and verify they remain within expected directories. Use indirect file references instead of direct paths.',
649
649
  },
650
650
  [error_codes_js_1.VulnerabilityCode.LFI_SOURCE_DISCLOSURE]: {
651
- id: 29,
651
+ id: 328,
652
652
  code: error_codes_js_1.VulnerabilityCode.LFI_SOURCE_DISCLOSURE,
653
653
  title: 'Local File Inclusion - Source Code Disclosure',
654
654
  description: 'Critical source code disclosure vulnerability where application source files can be read through file inclusion, exposing proprietary code, hardcoded credentials, API keys, database connection strings, and security implementation details that facilitate further attacks.',
@@ -671,7 +671,7 @@ exports.INJECTION_VULNERABILITIES = {
671
671
  remediation: 'Use allowlist validation for file access. Store source files outside web root. Implement proper access controls on file reading functionality. Remove any debug endpoints that read files.',
672
672
  },
673
673
  [error_codes_js_1.VulnerabilityCode.LFI_WRAPPER_PROTOCOL]: {
674
- id: 30,
674
+ id: 329,
675
675
  code: error_codes_js_1.VulnerabilityCode.LFI_WRAPPER_PROTOCOL,
676
676
  title: 'Local File Inclusion - PHP Wrapper Protocol',
677
677
  description: 'PHP wrapper protocol exploitation where filter or data wrappers like php://filter or php://input can be used to read source files as base64, write arbitrary files, or achieve remote code execution through deserialization when phar:// wrapper is enabled.',
@@ -693,7 +693,7 @@ exports.INJECTION_VULNERABILITIES = {
693
693
  remediation: 'Disable allow_url_include and allow_url_fopen in PHP configuration. Filter and validate all file path inputs. Block protocol wrappers in user input. Use allowlist for file access.',
694
694
  },
695
695
  [error_codes_js_1.VulnerabilityCode.XPATH_AUTH_BYPASS]: {
696
- id: 136,
696
+ id: 330,
697
697
  code: error_codes_js_1.VulnerabilityCode.XPATH_AUTH_BYPASS,
698
698
  title: 'XPath Injection - Authentication Bypass',
699
699
  description: 'XPath injection vulnerability where crafted input manipulates XPath queries to bypass authentication or authorization checks, allowing attackers to log in as other users or access protected resources without valid credentials.',
@@ -715,7 +715,7 @@ exports.INJECTION_VULNERABILITIES = {
715
715
  remediation: 'Use parameterized XPath queries or safe APIs that separate data from query logic. Validate and constrain user input for XPath contexts. Use allowlists and avoid dynamic XPath string concatenation.',
716
716
  },
717
717
  [error_codes_js_1.VulnerabilityCode.XPATH_DATA_EXTRACTION]: {
718
- id: 137,
718
+ id: 331,
719
719
  code: error_codes_js_1.VulnerabilityCode.XPATH_DATA_EXTRACTION,
720
720
  title: 'XPath Injection - Data Extraction',
721
721
  description: 'XPath injection vulnerability that allows attackers to read or enumerate sensitive XML data by manipulating query predicates, leading to disclosure of user data, configuration, or credentials stored in XML-backed systems.',
@@ -737,7 +737,7 @@ exports.INJECTION_VULNERABILITIES = {
737
737
  remediation: 'Use safe XPath APIs with variables/bind parameters. Apply strict input validation and encoding for XPath contexts. Restrict accessible XML data and apply least-privilege access controls.',
738
738
  },
739
739
  [error_codes_js_1.VulnerabilityCode.XPATH_BLIND]: {
740
- id: 138,
740
+ id: 332,
741
741
  code: error_codes_js_1.VulnerabilityCode.XPATH_BLIND,
742
742
  title: 'XPath Injection - Blind',
743
743
  description: 'Blind XPath injection vulnerability where attackers infer query results through boolean or timing differences, enabling gradual extraction of sensitive XML data despite no direct response output.',
@@ -759,7 +759,7 @@ exports.INJECTION_VULNERABILITIES = {
759
759
  remediation: 'Use parameterized XPath queries and input validation. Normalize error and response behaviors to reduce side-channel differences. Apply rate limiting to limit inference attacks.',
760
760
  },
761
761
  [error_codes_js_1.VulnerabilityCode.XPATH_ERROR_BASED]: {
762
- id: 139,
762
+ id: 333,
763
763
  code: error_codes_js_1.VulnerabilityCode.XPATH_ERROR_BASED,
764
764
  title: 'XPath Injection - Error Based',
765
765
  description: 'XPath injection vulnerability where malformed input triggers verbose error messages that reveal query structure or XML data, enabling attackers to craft precise XPath exploits or extract sensitive information.',