@zerothreatai/vulnerability-registry 4.0.0 → 6.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +17 -17
- package/dist/categories/configuration.js +80 -80
- package/dist/categories/injection.js +34 -34
- package/dist/categories/sensitive-paths.js +84 -84
- package/dist/categories/ssrf.js +11 -11
- package/dist/categories/xss.js +15 -15
- package/dist/compliance-codes.d.ts +207 -0
- package/dist/compliance-codes.js +213 -0
- package/dist/compliances/gdpr.d.ts +2 -0
- package/dist/compliances/gdpr.js +252 -0
- package/dist/compliances/helpers.d.ts +6 -0
- package/dist/compliances/helpers.js +11 -0
- package/dist/compliances/hipaa.d.ts +2 -0
- package/dist/compliances/hipaa.js +187 -0
- package/dist/compliances/index.d.ts +5 -0
- package/dist/compliances/index.js +5 -0
- package/dist/compliances/owasp.d.ts +2 -0
- package/dist/compliances/owasp.js +127 -0
- package/dist/compliances/pci-dss.d.ts +2 -0
- package/dist/compliances/pci-dss.js +260 -0
- package/dist/compliances/sans-top-25.d.ts +2 -0
- package/dist/compliances/sans-top-25.js +242 -0
- package/dist/index.d.ts +7 -1
- package/dist/index.js +7 -1
- package/dist/types.d.ts +33 -0
- package/dist/types.js +11 -1
- package/dist-cjs/categories/authentication.js +17 -17
- package/dist-cjs/categories/configuration.js +80 -80
- package/dist-cjs/categories/injection.js +34 -34
- package/dist-cjs/categories/sensitive-paths.js +84 -84
- package/dist-cjs/categories/ssrf.js +11 -11
- package/dist-cjs/categories/xss.js +15 -15
- package/dist-cjs/compliance-codes.js +216 -0
- package/dist-cjs/compliances/gdpr.js +255 -0
- package/dist-cjs/compliances/helpers.js +19 -0
- package/dist-cjs/compliances/hipaa.js +190 -0
- package/dist-cjs/compliances/index.js +13 -0
- package/dist-cjs/compliances/owasp.js +130 -0
- package/dist-cjs/compliances/pci-dss.js +263 -0
- package/dist-cjs/compliances/sans-top-25.js +245 -0
- package/dist-cjs/index.js +12 -1
- package/dist-cjs/types.js +12 -0
- package/package.json +40 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +17 -17
- package/src/categories/configuration.ts +80 -80
- package/src/categories/injection.ts +34 -34
- package/src/categories/sensitive-paths.ts +84 -84
- package/src/categories/ssrf.ts +11 -11
- package/src/categories/xss.ts +15 -15
- package/src/compliance-codes.ts +216 -0
- package/src/compliances/README.md +82 -0
- package/src/compliances/gdpr.ts +258 -0
- package/src/compliances/helpers.ts +29 -0
- package/src/compliances/hipaa.ts +193 -0
- package/src/compliances/index.ts +5 -0
- package/src/compliances/owasp.ts +133 -0
- package/src/compliances/pci-dss.ts +266 -0
- package/src/compliances/sans-top-25.ts +246 -0
- package/src/id-registry.json +1235 -0
- package/src/index.ts +12 -1
- package/src/types.ts +40 -4
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -392
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -1782
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -781
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1872
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -258
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -340
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -280
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -350
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -92
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -88
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -6
- package/src/types.js.map +0 -1
|
@@ -13,7 +13,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
13
13
|
// CRITICAL - CREDENTIAL EXPOSURE
|
|
14
14
|
// ========================================
|
|
15
15
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
|
|
16
|
-
id:
|
|
16
|
+
id: 500,
|
|
17
17
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
|
|
18
18
|
title: 'AWS Credentials Exposed',
|
|
19
19
|
description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
|
|
@@ -36,7 +36,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
36
36
|
remediation: 'Immediately rotate all exposed AWS credentials. Remove credentials from web-accessible paths. Use IAM roles for EC2 instances. Implement AWS Secrets Manager for credential storage.',
|
|
37
37
|
},
|
|
38
38
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
|
|
39
|
-
id:
|
|
39
|
+
id: 501,
|
|
40
40
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
|
|
41
41
|
title: 'SSH Private Key Exposed',
|
|
42
42
|
description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
|
|
@@ -58,7 +58,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
58
58
|
remediation: 'Immediately revoke and regenerate all SSH key pairs. Remove key files from web-accessible paths. Audit authorized_keys on all systems. Block access to .ssh directories in web server config.',
|
|
59
59
|
},
|
|
60
60
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
|
|
61
|
-
id:
|
|
61
|
+
id: 502,
|
|
62
62
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
|
|
63
63
|
title: 'SSL/TLS Private Key Exposed',
|
|
64
64
|
description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
|
|
@@ -80,7 +80,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
80
80
|
remediation: 'Immediately revoke the SSL certificate and generate new key pair. Remove private keys from web-accessible directories. Store keys outside webroot with restricted permissions.',
|
|
81
81
|
},
|
|
82
82
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
|
|
83
|
-
id:
|
|
83
|
+
id: 503,
|
|
84
84
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
|
|
85
85
|
title: 'Rails Master Key Exposed',
|
|
86
86
|
description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
|
|
@@ -102,7 +102,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
102
102
|
remediation: 'Regenerate Rails master key immediately. Rotate all credentials encrypted with the old key. Remove master.key from version control and web-accessible paths. Use environment variables.',
|
|
103
103
|
},
|
|
104
104
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
|
|
105
|
-
id:
|
|
105
|
+
id: 504,
|
|
106
106
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
|
|
107
107
|
title: 'Terraform State File Exposed',
|
|
108
108
|
description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
|
|
@@ -124,7 +124,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
124
124
|
remediation: 'Remove state files from web-accessible paths. Use remote state backends (S3, GCS, Azure) with encryption. Rotate any credentials found in state file. Enable state encryption.',
|
|
125
125
|
},
|
|
126
126
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
|
|
127
|
-
id:
|
|
127
|
+
id: 505,
|
|
128
128
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
|
|
129
129
|
title: 'Kubernetes Config Exposed',
|
|
130
130
|
description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
|
|
@@ -146,7 +146,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
146
146
|
remediation: 'Immediately revoke exposed service account tokens and certificates. Rotate cluster credentials. Remove config from web paths. Use RBAC with minimal permissions.',
|
|
147
147
|
},
|
|
148
148
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
|
|
149
|
-
id:
|
|
149
|
+
id: 506,
|
|
150
150
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
|
|
151
151
|
title: 'HashiCorp Vault Secret Exposed',
|
|
152
152
|
description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
|
|
@@ -171,7 +171,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
171
171
|
// HIGH - SOURCE CODE & CONFIG EXPOSURE
|
|
172
172
|
// ========================================
|
|
173
173
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
|
|
174
|
-
id:
|
|
174
|
+
id: 507,
|
|
175
175
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
|
|
176
176
|
title: 'Git Repository Exposed',
|
|
177
177
|
description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
|
|
@@ -193,7 +193,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
193
193
|
remediation: 'Block access to .git directory in web server configuration. Remove .git from production deployments. Audit git history for accidentally committed secrets.',
|
|
194
194
|
},
|
|
195
195
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
|
|
196
|
-
id:
|
|
196
|
+
id: 508,
|
|
197
197
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE,
|
|
198
198
|
title: 'Environment File Exposed',
|
|
199
199
|
description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
|
|
@@ -215,7 +215,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
215
215
|
remediation: 'Remove .env files from web-accessible directories. Block access to dotfiles in web server config. Rotate all credentials found in exposed files. Use secrets management services.',
|
|
216
216
|
},
|
|
217
217
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
|
|
218
|
-
id:
|
|
218
|
+
id: 509,
|
|
219
219
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
|
|
220
220
|
title: 'WordPress Configuration File Exposed',
|
|
221
221
|
description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
|
|
@@ -237,7 +237,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
237
237
|
remediation: 'Ensure PHP is properly configured to execute .php files rather than serve them as text. Move wp-config.php above the web root. Change database credentials immediately.',
|
|
238
238
|
},
|
|
239
239
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
|
|
240
|
-
id:
|
|
240
|
+
id: 510,
|
|
241
241
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
|
|
242
242
|
title: 'Spring Boot Actuator Endpoints Exposed',
|
|
243
243
|
description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
|
|
@@ -260,7 +260,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
260
260
|
remediation: 'Secure actuator endpoints with authentication. Disable sensitive endpoints in production. Use separate management port accessible only internally. Apply principle of least exposure.',
|
|
261
261
|
},
|
|
262
262
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
|
|
263
|
-
id:
|
|
263
|
+
id: 511,
|
|
264
264
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
|
|
265
265
|
title: 'Spring Boot Heapdump Exposed',
|
|
266
266
|
description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
|
|
@@ -282,7 +282,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
282
282
|
remediation: 'Disable heapdump endpoint in production (management.endpoint.heapdump.enabled=false). Require authentication for all actuator endpoints. Invalidate all active sessions.',
|
|
283
283
|
},
|
|
284
284
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO]: {
|
|
285
|
-
id:
|
|
285
|
+
id: 512,
|
|
286
286
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO,
|
|
287
287
|
title: 'PHP Info Page Exposed',
|
|
288
288
|
description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
|
|
@@ -304,7 +304,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
304
304
|
remediation: 'Remove phpinfo files from production servers. If needed for debugging, protect with authentication or IP restrictions. Delete all debug and test files before deployment.',
|
|
305
305
|
},
|
|
306
306
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
|
|
307
|
-
id:
|
|
307
|
+
id: 513,
|
|
308
308
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
|
|
309
309
|
title: 'Laravel Debug Mode Enabled',
|
|
310
310
|
description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
|
|
@@ -326,7 +326,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
326
326
|
remediation: 'Set APP_DEBUG=false in production environment. Rotate APP_KEY if exposed. Implement proper error logging that does not expose internals to users.',
|
|
327
327
|
},
|
|
328
328
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
|
|
329
|
-
id:
|
|
329
|
+
id: 514,
|
|
330
330
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
|
|
331
331
|
title: 'GraphQL Introspection Enabled',
|
|
332
332
|
description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
|
|
@@ -348,7 +348,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
348
348
|
remediation: 'Disable introspection in production (introspection: false in Apollo Server). Implement query depth limiting and complexity analysis. Use persisted queries.',
|
|
349
349
|
},
|
|
350
350
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
|
|
351
|
-
id:
|
|
351
|
+
id: 515,
|
|
352
352
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
|
|
353
353
|
title: 'Database Backup File Exposed',
|
|
354
354
|
description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
|
|
@@ -373,7 +373,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
373
373
|
// MEDIUM - API & SERVICE EXPOSURE
|
|
374
374
|
// ========================================
|
|
375
375
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
|
|
376
|
-
id:
|
|
376
|
+
id: 516,
|
|
377
377
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
|
|
378
378
|
title: 'Swagger/OpenAPI Documentation Exposed',
|
|
379
379
|
description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
|
|
@@ -395,7 +395,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
395
395
|
remediation: 'Protect API documentation with authentication if it should be internal. Ensure publicly documented APIs have proper authorization. Remove internal endpoints from public docs.',
|
|
396
396
|
},
|
|
397
397
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
|
|
398
|
-
id:
|
|
398
|
+
id: 517,
|
|
399
399
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
|
|
400
400
|
title: 'Prometheus Metrics Endpoint Exposed',
|
|
401
401
|
description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
|
|
@@ -417,7 +417,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
417
417
|
remediation: 'Restrict metrics endpoint to internal network or Prometheus server IPs. Use separate port for metrics collection. Implement authentication if external access is required.',
|
|
418
418
|
},
|
|
419
419
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
|
|
420
|
-
id:
|
|
420
|
+
id: 518,
|
|
421
421
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL,
|
|
422
422
|
title: 'Admin Panel Publicly Accessible',
|
|
423
423
|
description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
|
|
@@ -439,7 +439,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
439
439
|
remediation: 'Restrict admin panel access to VPN or internal IP ranges. Implement strong multi-factor authentication. Use rate limiting and account lockout. Consider separate admin domain.',
|
|
440
440
|
},
|
|
441
441
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
|
|
442
|
-
id:
|
|
442
|
+
id: 519,
|
|
443
443
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP,
|
|
444
444
|
title: 'JavaScript Source Maps Exposed',
|
|
445
445
|
description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
|
|
@@ -464,7 +464,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
464
464
|
// EXTENDED SENSITIVE PATH EXPOSURES
|
|
465
465
|
// ========================================
|
|
466
466
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
|
|
467
|
-
id:
|
|
467
|
+
id: 520,
|
|
468
468
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
|
|
469
469
|
title: 'Un Protected Config JSON',
|
|
470
470
|
description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -486,7 +486,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
486
486
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
487
487
|
},
|
|
488
488
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
|
|
489
|
-
id:
|
|
489
|
+
id: 521,
|
|
490
490
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
|
|
491
491
|
title: 'Web Server Configuration File Detected',
|
|
492
492
|
description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -508,7 +508,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
508
508
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
509
509
|
},
|
|
510
510
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
|
|
511
|
-
id:
|
|
511
|
+
id: 522,
|
|
512
512
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
|
|
513
513
|
title: 'Appsettings JSON Exposed',
|
|
514
514
|
description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -530,7 +530,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
530
530
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
531
531
|
},
|
|
532
532
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
|
|
533
|
-
id:
|
|
533
|
+
id: 523,
|
|
534
534
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
|
|
535
535
|
title: 'Spring Config Exposed',
|
|
536
536
|
description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -552,7 +552,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
552
552
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
553
553
|
},
|
|
554
554
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
|
|
555
|
-
id:
|
|
555
|
+
id: 524,
|
|
556
556
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
|
|
557
557
|
title: 'Npmrc Exposed',
|
|
558
558
|
description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -574,7 +574,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
574
574
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
575
575
|
},
|
|
576
576
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
|
|
577
|
-
id:
|
|
577
|
+
id: 525,
|
|
578
578
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
|
|
579
579
|
title: 'TOML Project File Exposed',
|
|
580
580
|
description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -596,7 +596,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
596
596
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
597
597
|
},
|
|
598
598
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
|
|
599
|
-
id:
|
|
599
|
+
id: 526,
|
|
600
600
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
|
|
601
601
|
title: 'Rails Database YML Exposed',
|
|
602
602
|
description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -618,7 +618,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
618
618
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
619
619
|
},
|
|
620
620
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
|
|
621
|
-
id:
|
|
621
|
+
id: 527,
|
|
622
622
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
|
|
623
623
|
title: 'Drupal Settings PHP Exposed',
|
|
624
624
|
description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -640,7 +640,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
640
640
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
641
641
|
},
|
|
642
642
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
|
|
643
|
-
id:
|
|
643
|
+
id: 528,
|
|
644
644
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
|
|
645
645
|
title: 'Magento Env PHP Exposed',
|
|
646
646
|
description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -662,7 +662,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
662
662
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
663
663
|
},
|
|
664
664
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
|
|
665
|
-
id:
|
|
665
|
+
id: 529,
|
|
666
666
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
|
|
667
667
|
title: 'Jolokia Exposed',
|
|
668
668
|
description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -684,7 +684,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
684
684
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
685
685
|
},
|
|
686
686
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
|
|
687
|
-
id:
|
|
687
|
+
id: 530,
|
|
688
688
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
|
|
689
689
|
title: 'SVN Working Copy Database Exposed',
|
|
690
690
|
description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -706,7 +706,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
706
706
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
707
707
|
},
|
|
708
708
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
|
|
709
|
-
id:
|
|
709
|
+
id: 531,
|
|
710
710
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
|
|
711
711
|
title: 'Subversion Repository Detected',
|
|
712
712
|
description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -728,7 +728,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
728
728
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
729
729
|
},
|
|
730
730
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
|
|
731
|
-
id:
|
|
731
|
+
id: 532,
|
|
732
732
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
|
|
733
733
|
title: 'Mercurial Repository Found',
|
|
734
734
|
description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -750,7 +750,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
750
750
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
751
751
|
},
|
|
752
752
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
|
|
753
|
-
id:
|
|
753
|
+
id: 533,
|
|
754
754
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
|
|
755
755
|
title: 'Mercurial Hgrc Exposed',
|
|
756
756
|
description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -772,7 +772,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
772
772
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
773
773
|
},
|
|
774
774
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
|
|
775
|
-
id:
|
|
775
|
+
id: 534,
|
|
776
776
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
|
|
777
777
|
title: 'CVS Root Exposed',
|
|
778
778
|
description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -794,7 +794,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
794
794
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
795
795
|
},
|
|
796
796
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
|
|
797
|
-
id:
|
|
797
|
+
id: 535,
|
|
798
798
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
|
|
799
799
|
title: 'CVS Entries Exposed',
|
|
800
800
|
description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -816,7 +816,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
816
816
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
817
817
|
},
|
|
818
818
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
|
|
819
|
-
id:
|
|
819
|
+
id: 536,
|
|
820
820
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
|
|
821
821
|
title: 'Bazaar Repo Exposed',
|
|
822
822
|
description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -838,7 +838,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
838
838
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
839
839
|
},
|
|
840
840
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
|
|
841
|
-
id:
|
|
841
|
+
id: 537,
|
|
842
842
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
|
|
843
843
|
title: 'Spring Boot Thread Dump Exposed',
|
|
844
844
|
description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -860,7 +860,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
860
860
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
861
861
|
},
|
|
862
862
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
|
|
863
|
-
id:
|
|
863
|
+
id: 538,
|
|
864
864
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
|
|
865
865
|
title: 'Redis Rdb Dump Detected',
|
|
866
866
|
description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -882,7 +882,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
882
882
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
883
883
|
},
|
|
884
884
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
885
|
-
id:
|
|
885
|
+
id: 539,
|
|
886
886
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
|
|
887
887
|
title: 'Atlassian Bitbucket Pipelines Configuration Detected',
|
|
888
888
|
description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -904,7 +904,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
904
904
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
905
905
|
},
|
|
906
906
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
907
|
-
id:
|
|
907
|
+
id: 540,
|
|
908
908
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
|
|
909
909
|
title: 'AZURE Pipelines Configuration Detected',
|
|
910
910
|
description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -926,7 +926,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
926
926
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
927
927
|
},
|
|
928
928
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
|
|
929
|
-
id:
|
|
929
|
+
id: 541,
|
|
930
930
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
|
|
931
931
|
title: 'AWS Code Build Buildspec Detected',
|
|
932
932
|
description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -948,7 +948,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
948
948
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
949
949
|
},
|
|
950
950
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
|
|
951
|
-
id:
|
|
951
|
+
id: 542,
|
|
952
952
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
|
|
953
953
|
title: 'Github Actions Workflow Detected',
|
|
954
954
|
description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -970,7 +970,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
970
970
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
971
971
|
},
|
|
972
972
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
|
|
973
|
-
id:
|
|
973
|
+
id: 543,
|
|
974
974
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
|
|
975
975
|
title: 'Docker Compose Configuration Detected',
|
|
976
976
|
description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -992,7 +992,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
992
992
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
993
993
|
},
|
|
994
994
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
|
|
995
|
-
id:
|
|
995
|
+
id: 544,
|
|
996
996
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD,
|
|
997
997
|
title: 'Trace Axd',
|
|
998
998
|
description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1014,7 +1014,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1014
1014
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1015
1015
|
},
|
|
1016
1016
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
|
|
1017
|
-
id:
|
|
1017
|
+
id: 545,
|
|
1018
1018
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
|
|
1019
1019
|
title: 'Elmah Axd Exposed',
|
|
1020
1020
|
description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1036,7 +1036,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1036
1036
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1037
1037
|
},
|
|
1038
1038
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
|
|
1039
|
-
id:
|
|
1039
|
+
id: 546,
|
|
1040
1040
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
|
|
1041
1041
|
title: 'Laravel Log Viewer Enabled',
|
|
1042
1042
|
description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1058,7 +1058,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1058
1058
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1059
1059
|
},
|
|
1060
1060
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
|
|
1061
|
-
id:
|
|
1061
|
+
id: 547,
|
|
1062
1062
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
|
|
1063
1063
|
title: 'Apache Htaccess File Detected',
|
|
1064
1064
|
description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1080,7 +1080,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1080
1080
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1081
1081
|
},
|
|
1082
1082
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
|
|
1083
|
-
id:
|
|
1083
|
+
id: 548,
|
|
1084
1084
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
|
|
1085
1085
|
title: 'Apache Server Info Exposed',
|
|
1086
1086
|
description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1102,7 +1102,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1102
1102
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1103
1103
|
},
|
|
1104
1104
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
|
|
1105
|
-
id:
|
|
1105
|
+
id: 549,
|
|
1106
1106
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
|
|
1107
1107
|
title: 'Sqlite Database Detected',
|
|
1108
1108
|
description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1124,7 +1124,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1124
1124
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1125
1125
|
},
|
|
1126
1126
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
|
|
1127
|
-
id:
|
|
1127
|
+
id: 550,
|
|
1128
1128
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
|
|
1129
1129
|
title: 'Package Dependencies Detected',
|
|
1130
1130
|
description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1146,7 +1146,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1146
1146
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1147
1147
|
},
|
|
1148
1148
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
|
|
1149
|
-
id:
|
|
1149
|
+
id: 551,
|
|
1150
1150
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
|
|
1151
1151
|
title: 'PHP Composer Dependencies Detected',
|
|
1152
1152
|
description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1168,7 +1168,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1168
1168
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1169
1169
|
},
|
|
1170
1170
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
|
|
1171
|
-
id:
|
|
1171
|
+
id: 552,
|
|
1172
1172
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
|
|
1173
1173
|
title: 'Python Requirements Detected',
|
|
1174
1174
|
description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1190,7 +1190,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1190
1190
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1191
1191
|
},
|
|
1192
1192
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
|
|
1193
|
-
id:
|
|
1193
|
+
id: 553,
|
|
1194
1194
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
|
|
1195
1195
|
title: 'AWS Config Exposed',
|
|
1196
1196
|
description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1212,7 +1212,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1212
1212
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1213
1213
|
},
|
|
1214
1214
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
|
|
1215
|
-
id:
|
|
1215
|
+
id: 554,
|
|
1216
1216
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
|
|
1217
1217
|
title: 'AZURE Credentials Exposed',
|
|
1218
1218
|
description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1234,7 +1234,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1234
1234
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1235
1235
|
},
|
|
1236
1236
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
|
|
1237
|
-
id:
|
|
1237
|
+
id: 555,
|
|
1238
1238
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
|
|
1239
1239
|
title: 'Helm Values Exposed',
|
|
1240
1240
|
description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1256,7 +1256,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1256
1256
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1257
1257
|
},
|
|
1258
1258
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
|
|
1259
|
-
id:
|
|
1259
|
+
id: 556,
|
|
1260
1260
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
|
|
1261
1261
|
title: 'SSH Public Key Exposed',
|
|
1262
1262
|
description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1278,7 +1278,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1278
1278
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1279
1279
|
},
|
|
1280
1280
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
|
|
1281
|
-
id:
|
|
1281
|
+
id: 557,
|
|
1282
1282
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
|
|
1283
1283
|
title: 'SSL Certificate Exposed',
|
|
1284
1284
|
description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1300,7 +1300,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1300
1300
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1301
1301
|
},
|
|
1302
1302
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
|
|
1303
|
-
id:
|
|
1303
|
+
id: 558,
|
|
1304
1304
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
|
|
1305
1305
|
title: 'Graph Ql Endpoint Exposed',
|
|
1306
1306
|
description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1322,7 +1322,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1322
1322
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1323
1323
|
},
|
|
1324
1324
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
|
|
1325
|
-
id:
|
|
1325
|
+
id: 559,
|
|
1326
1326
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
|
|
1327
1327
|
title: 'Graphi Ql Exposed',
|
|
1328
1328
|
description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1344,7 +1344,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1344
1344
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1345
1345
|
},
|
|
1346
1346
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
|
|
1347
|
-
id:
|
|
1347
|
+
id: 560,
|
|
1348
1348
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
|
|
1349
1349
|
title: 'Terraform Lock Exposed',
|
|
1350
1350
|
description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1366,7 +1366,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1366
1366
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1367
1367
|
},
|
|
1368
1368
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
|
|
1369
|
-
id:
|
|
1369
|
+
id: 561,
|
|
1370
1370
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
|
|
1371
1371
|
title: 'Terraform Vars Exposed',
|
|
1372
1372
|
description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1388,7 +1388,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1388
1388
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1389
1389
|
},
|
|
1390
1390
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
|
|
1391
|
-
id:
|
|
1391
|
+
id: 562,
|
|
1392
1392
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
|
|
1393
1393
|
title: 'Error Log Exposed',
|
|
1394
1394
|
description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1410,7 +1410,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1410
1410
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1411
1411
|
},
|
|
1412
1412
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
|
|
1413
|
-
id:
|
|
1413
|
+
id: 563,
|
|
1414
1414
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
|
|
1415
1415
|
title: 'Access Log Exposed',
|
|
1416
1416
|
description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1432,7 +1432,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1432
1432
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1433
1433
|
},
|
|
1434
1434
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
|
|
1435
|
-
id:
|
|
1435
|
+
id: 564,
|
|
1436
1436
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
|
|
1437
1437
|
title: 'Debug Log Exposed',
|
|
1438
1438
|
description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1454,7 +1454,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1454
1454
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1455
1455
|
},
|
|
1456
1456
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
|
|
1457
|
-
id:
|
|
1457
|
+
id: 565,
|
|
1458
1458
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
|
|
1459
1459
|
title: 'Application Log Exposed',
|
|
1460
1460
|
description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1476,7 +1476,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1476
1476
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1477
1477
|
},
|
|
1478
1478
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
|
|
1479
|
-
id:
|
|
1479
|
+
id: 566,
|
|
1480
1480
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
|
|
1481
1481
|
title: 'Laravel Log Exposed',
|
|
1482
1482
|
description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1498,7 +1498,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1498
1498
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1499
1499
|
},
|
|
1500
1500
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
|
|
1501
|
-
id:
|
|
1501
|
+
id: 567,
|
|
1502
1502
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
|
|
1503
1503
|
title: 'Word Press Debug Log Exposed',
|
|
1504
1504
|
description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1520,7 +1520,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1520
1520
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1521
1521
|
},
|
|
1522
1522
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
|
|
1523
|
-
id:
|
|
1523
|
+
id: 568,
|
|
1524
1524
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
|
|
1525
1525
|
title: 'Adminer Exposed',
|
|
1526
1526
|
description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1542,7 +1542,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1542
1542
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1543
1543
|
},
|
|
1544
1544
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
|
|
1545
|
-
id:
|
|
1545
|
+
id: 569,
|
|
1546
1546
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
|
|
1547
1547
|
title: 'WSDL Exposed',
|
|
1548
1548
|
description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1564,7 +1564,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1564
1564
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1565
1565
|
},
|
|
1566
1566
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
|
|
1567
|
-
id:
|
|
1567
|
+
id: 570,
|
|
1568
1568
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
|
|
1569
1569
|
title: 'Debug Endpoint Exposed',
|
|
1570
1570
|
description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1586,7 +1586,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1586
1586
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1587
1587
|
},
|
|
1588
1588
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
|
|
1589
|
-
id:
|
|
1589
|
+
id: 571,
|
|
1590
1590
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
|
|
1591
1591
|
title: 'Go Debug Vars Exposed',
|
|
1592
1592
|
description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1608,7 +1608,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1608
1608
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1609
1609
|
},
|
|
1610
1610
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
|
|
1611
|
-
id:
|
|
1611
|
+
id: 572,
|
|
1612
1612
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
|
|
1613
1613
|
title: 'Go Pprof Exposed',
|
|
1614
1614
|
description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1630,7 +1630,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1630
1630
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1631
1631
|
},
|
|
1632
1632
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
|
|
1633
|
-
id:
|
|
1633
|
+
id: 573,
|
|
1634
1634
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
|
|
1635
1635
|
title: 'Word Press XML Rpc Exposed',
|
|
1636
1636
|
description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1652,7 +1652,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1652
1652
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1653
1653
|
},
|
|
1654
1654
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
|
|
1655
|
-
id:
|
|
1655
|
+
id: 574,
|
|
1656
1656
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
|
|
1657
1657
|
title: 'Test Endpoint Exposed',
|
|
1658
1658
|
description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1674,7 +1674,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1674
1674
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1675
1675
|
},
|
|
1676
1676
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
|
|
1677
|
-
id:
|
|
1677
|
+
id: 575,
|
|
1678
1678
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
|
|
1679
1679
|
title: 'Staging Endpoint Exposed',
|
|
1680
1680
|
description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1696,7 +1696,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1696
1696
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1697
1697
|
},
|
|
1698
1698
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
|
|
1699
|
-
id:
|
|
1699
|
+
id: 576,
|
|
1700
1700
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
|
|
1701
1701
|
title: 'Editor Backup File Detected',
|
|
1702
1702
|
description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1718,7 +1718,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1718
1718
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1719
1719
|
},
|
|
1720
1720
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
|
|
1721
|
-
id:
|
|
1721
|
+
id: 577,
|
|
1722
1722
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
|
|
1723
1723
|
title: 'VIM Swap File Detected',
|
|
1724
1724
|
description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1740,7 +1740,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1740
1740
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1741
1741
|
},
|
|
1742
1742
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
|
|
1743
|
-
id:
|
|
1743
|
+
id: 578,
|
|
1744
1744
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
|
|
1745
1745
|
title: 'Directory Listing Enabled',
|
|
1746
1746
|
description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1762,7 +1762,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1762
1762
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1763
1763
|
},
|
|
1764
1764
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
|
|
1765
|
-
id:
|
|
1765
|
+
id: 579,
|
|
1766
1766
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
|
|
1767
1767
|
title: 'AZURE Storage Config Exposed',
|
|
1768
1768
|
description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1784,7 +1784,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1784
1784
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1785
1785
|
},
|
|
1786
1786
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
|
|
1787
|
-
id:
|
|
1787
|
+
id: 580,
|
|
1788
1788
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
|
|
1789
1789
|
title: 'Mongo Rc Exposed',
|
|
1790
1790
|
description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1806,7 +1806,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1806
1806
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1807
1807
|
},
|
|
1808
1808
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
|
|
1809
|
-
id:
|
|
1809
|
+
id: 581,
|
|
1810
1810
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
|
|
1811
1811
|
title: 'Awssam Template Exposed',
|
|
1812
1812
|
description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1828,7 +1828,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1828
1828
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1829
1829
|
},
|
|
1830
1830
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
|
|
1831
|
-
id:
|
|
1831
|
+
id: 582,
|
|
1832
1832
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
|
|
1833
1833
|
title: 'Serverless Config Exposed',
|
|
1834
1834
|
description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1850,7 +1850,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1850
1850
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1851
1851
|
},
|
|
1852
1852
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
|
|
1853
|
-
id:
|
|
1853
|
+
id: 583,
|
|
1854
1854
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
|
|
1855
1855
|
title: 'Cloud Formation Template Exposed',
|
|
1856
1856
|
description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|