@zerothreatai/vulnerability-registry 4.0.0 → 6.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +17 -17
- package/dist/categories/configuration.js +80 -80
- package/dist/categories/injection.js +34 -34
- package/dist/categories/sensitive-paths.js +84 -84
- package/dist/categories/ssrf.js +11 -11
- package/dist/categories/xss.js +15 -15
- package/dist/compliance-codes.d.ts +207 -0
- package/dist/compliance-codes.js +213 -0
- package/dist/compliances/gdpr.d.ts +2 -0
- package/dist/compliances/gdpr.js +252 -0
- package/dist/compliances/helpers.d.ts +6 -0
- package/dist/compliances/helpers.js +11 -0
- package/dist/compliances/hipaa.d.ts +2 -0
- package/dist/compliances/hipaa.js +187 -0
- package/dist/compliances/index.d.ts +5 -0
- package/dist/compliances/index.js +5 -0
- package/dist/compliances/owasp.d.ts +2 -0
- package/dist/compliances/owasp.js +127 -0
- package/dist/compliances/pci-dss.d.ts +2 -0
- package/dist/compliances/pci-dss.js +260 -0
- package/dist/compliances/sans-top-25.d.ts +2 -0
- package/dist/compliances/sans-top-25.js +242 -0
- package/dist/index.d.ts +7 -1
- package/dist/index.js +7 -1
- package/dist/types.d.ts +33 -0
- package/dist/types.js +11 -1
- package/dist-cjs/categories/authentication.js +17 -17
- package/dist-cjs/categories/configuration.js +80 -80
- package/dist-cjs/categories/injection.js +34 -34
- package/dist-cjs/categories/sensitive-paths.js +84 -84
- package/dist-cjs/categories/ssrf.js +11 -11
- package/dist-cjs/categories/xss.js +15 -15
- package/dist-cjs/compliance-codes.js +216 -0
- package/dist-cjs/compliances/gdpr.js +255 -0
- package/dist-cjs/compliances/helpers.js +19 -0
- package/dist-cjs/compliances/hipaa.js +190 -0
- package/dist-cjs/compliances/index.js +13 -0
- package/dist-cjs/compliances/owasp.js +130 -0
- package/dist-cjs/compliances/pci-dss.js +263 -0
- package/dist-cjs/compliances/sans-top-25.js +245 -0
- package/dist-cjs/index.js +12 -1
- package/dist-cjs/types.js +12 -0
- package/package.json +40 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +17 -17
- package/src/categories/configuration.ts +80 -80
- package/src/categories/injection.ts +34 -34
- package/src/categories/sensitive-paths.ts +84 -84
- package/src/categories/ssrf.ts +11 -11
- package/src/categories/xss.ts +15 -15
- package/src/compliance-codes.ts +216 -0
- package/src/compliances/README.md +82 -0
- package/src/compliances/gdpr.ts +258 -0
- package/src/compliances/helpers.ts +29 -0
- package/src/compliances/hipaa.ts +193 -0
- package/src/compliances/index.ts +5 -0
- package/src/compliances/owasp.ts +133 -0
- package/src/compliances/pci-dss.ts +266 -0
- package/src/compliances/sans-top-25.ts +246 -0
- package/src/id-registry.json +1235 -0
- package/src/index.ts +12 -1
- package/src/types.ts +40 -4
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -392
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -1782
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -781
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1872
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -258
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -340
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -280
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -350
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -92
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -88
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -6
- package/src/types.js.map +0 -1
|
@@ -9,7 +9,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
9
9
|
// SECURITY HEADERS
|
|
10
10
|
// ========================================
|
|
11
11
|
[VulnerabilityCode.HEADER_MISSING_CSP]: {
|
|
12
|
-
id:
|
|
12
|
+
id: 200,
|
|
13
13
|
code: VulnerabilityCode.HEADER_MISSING_CSP,
|
|
14
14
|
title: 'Missing Security Header - Content-Security-Policy',
|
|
15
15
|
description: 'The application does not implement Content-Security-Policy header, leaving it vulnerable to cross-site scripting attacks that could be mitigated by restricting the sources from which scripts, styles, and other resources can be loaded into the page.',
|
|
@@ -31,7 +31,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
31
31
|
remediation: 'Implement Content-Security-Policy header with strict directives. Start with default-src self and progressively add required sources. Use nonce-based CSP for inline scripts.',
|
|
32
32
|
},
|
|
33
33
|
[VulnerabilityCode.HEADER_MISSING_HSTS]: {
|
|
34
|
-
id:
|
|
34
|
+
id: 201,
|
|
35
35
|
code: VulnerabilityCode.HEADER_MISSING_HSTS,
|
|
36
36
|
title: 'Missing Security Header - Strict-Transport-Security',
|
|
37
37
|
description: 'The application does not implement HSTS (HTTP Strict Transport Security) header, leaving users vulnerable to SSL stripping attacks and man-in-the-middle downgrades from HTTPS to HTTP connections on initial visits or after cookie expiration.',
|
|
@@ -53,7 +53,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
53
53
|
remediation: 'Add Strict-Transport-Security header with max-age of at least 31536000 (1 year). Include includeSubDomains directive. Consider HSTS preloading for maximum protection.',
|
|
54
54
|
},
|
|
55
55
|
[VulnerabilityCode.HEADER_HSTS_BAD_MAX_AGE]: {
|
|
56
|
-
id:
|
|
56
|
+
id: 202,
|
|
57
57
|
code: VulnerabilityCode.HEADER_HSTS_BAD_MAX_AGE,
|
|
58
58
|
title: 'HSTS Misconfiguration - Invalid Max-Age',
|
|
59
59
|
description: 'The Strict-Transport-Security header uses an invalid or malformed max-age value, preventing reliable HTTPS enforcement.',
|
|
@@ -75,7 +75,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
75
75
|
remediation: 'Set a valid numeric max-age on Strict-Transport-Security (at least 31536000).',
|
|
76
76
|
},
|
|
77
77
|
[VulnerabilityCode.HEADER_HSTS_SHORT_MAX_AGE]: {
|
|
78
|
-
id:
|
|
78
|
+
id: 203,
|
|
79
79
|
code: VulnerabilityCode.HEADER_HSTS_SHORT_MAX_AGE,
|
|
80
80
|
title: 'HSTS Misconfiguration - Max-Age Too Short',
|
|
81
81
|
description: 'The Strict-Transport-Security header uses a short max-age value that weakens HTTPS enforcement and allows downgrade risk to return quickly.',
|
|
@@ -97,7 +97,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
97
97
|
remediation: 'Increase max-age to at least 31536000 (1 year) to provide durable HTTPS enforcement.',
|
|
98
98
|
},
|
|
99
99
|
[VulnerabilityCode.HEADER_HSTS_NO_INCLUDESUBDOMAINS]: {
|
|
100
|
-
id:
|
|
100
|
+
id: 204,
|
|
101
101
|
code: VulnerabilityCode.HEADER_HSTS_NO_INCLUDESUBDOMAINS,
|
|
102
102
|
title: 'HSTS Misconfiguration - Missing includeSubDomains',
|
|
103
103
|
description: 'The Strict-Transport-Security header is missing includeSubDomains, leaving subdomains unprotected from downgrade and stripping attacks.',
|
|
@@ -119,7 +119,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
119
119
|
remediation: 'Add includeSubDomains to the HSTS header to protect all subdomains.',
|
|
120
120
|
},
|
|
121
121
|
[VulnerabilityCode.HEADER_HSTS_PRELOAD_LOW_MAX_AGE]: {
|
|
122
|
-
id:
|
|
122
|
+
id: 205,
|
|
123
123
|
code: VulnerabilityCode.HEADER_HSTS_PRELOAD_LOW_MAX_AGE,
|
|
124
124
|
title: 'HSTS Preload Requirements Not Met',
|
|
125
125
|
description: 'The HSTS header indicates preload intent but does not meet preload requirements, such as a sufficiently long max-age or includeSubDomains, reducing preload effectiveness.',
|
|
@@ -141,7 +141,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
141
141
|
remediation: 'Ensure HSTS max-age is at least 31536000, include includeSubDomains, and add preload before submitting to the preload list.',
|
|
142
142
|
},
|
|
143
143
|
[VulnerabilityCode.HEADER_MISSING_XFRAME]: {
|
|
144
|
-
id:
|
|
144
|
+
id: 206,
|
|
145
145
|
code: VulnerabilityCode.HEADER_MISSING_XFRAME,
|
|
146
146
|
title: 'Missing Security Header - X-Frame-Options',
|
|
147
147
|
description: 'The application does not set X-Frame-Options header, making it vulnerable to clickjacking attacks where malicious websites can embed the application in invisible iframes and trick users into performing unintended actions through deceptive UI overlays.',
|
|
@@ -163,7 +163,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
163
163
|
remediation: 'Set X-Frame-Options header to DENY or SAMEORIGIN. Use Content-Security-Policy frame-ancestors directive for more granular control. Both headers can be used together for compatibility.',
|
|
164
164
|
},
|
|
165
165
|
[VulnerabilityCode.HEADER_WEAK_CSP]: {
|
|
166
|
-
id:
|
|
166
|
+
id: 207,
|
|
167
167
|
code: VulnerabilityCode.HEADER_WEAK_CSP,
|
|
168
168
|
title: 'Weak Content-Security-Policy Configuration',
|
|
169
169
|
description: 'The Content-Security-Policy header contains unsafe directives like unsafe-inline, unsafe-eval, or overly permissive source allowlists that significantly reduce its effectiveness as an XSS mitigation and may create false sense of security.',
|
|
@@ -185,7 +185,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
185
185
|
remediation: 'Remove unsafe-inline and unsafe-eval directives. Use nonce-based or hash-based CSP for inline scripts. Restrict source allowlists to specific trusted domains rather than wildcards.',
|
|
186
186
|
},
|
|
187
187
|
[VulnerabilityCode.HEADER_CSP_REPORT_ONLY]: {
|
|
188
|
-
id:
|
|
188
|
+
id: 208,
|
|
189
189
|
code: VulnerabilityCode.HEADER_CSP_REPORT_ONLY,
|
|
190
190
|
title: 'Content-Security-Policy Report-Only Enabled',
|
|
191
191
|
description: 'The Content-Security-Policy header is deployed in report-only mode, which does not enforce protections and allows unsafe content to execute while only logging violations.',
|
|
@@ -207,7 +207,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
207
207
|
remediation: 'Switch to enforcing Content-Security-Policy once violations are reviewed. Use report-only during rollout, then enforce with strict directives.',
|
|
208
208
|
},
|
|
209
209
|
[VulnerabilityCode.HEADER_CSP_WEAK_DIRECTIVES]: {
|
|
210
|
-
id:
|
|
210
|
+
id: 209,
|
|
211
211
|
code: VulnerabilityCode.HEADER_CSP_WEAK_DIRECTIVES,
|
|
212
212
|
title: 'Content-Security-Policy Contains Unsafe Directives',
|
|
213
213
|
description: 'The Content-Security-Policy header includes unsafe directives such as unsafe-inline or unsafe-eval that reduce XSS protection and allow risky script execution paths.',
|
|
@@ -229,7 +229,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
229
229
|
remediation: 'Remove unsafe-inline and unsafe-eval directives. Replace inline scripts with nonces or hashes and restrict sources to trusted domains.',
|
|
230
230
|
},
|
|
231
231
|
[VulnerabilityCode.HEADER_CSP_DATA_URI_SCRIPT]: {
|
|
232
|
-
id:
|
|
232
|
+
id: 210,
|
|
233
233
|
code: VulnerabilityCode.HEADER_CSP_DATA_URI_SCRIPT,
|
|
234
234
|
title: 'Content-Security-Policy Allows data: in script-src',
|
|
235
235
|
description: 'The CSP allows data: URIs for script execution, which can enable script injection through crafted data URLs and weaken XSS protections.',
|
|
@@ -251,7 +251,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
251
251
|
remediation: 'Remove data: from script-src. Use nonce or hash-based CSP for any required inline scripts.',
|
|
252
252
|
},
|
|
253
253
|
[VulnerabilityCode.HEADER_CSP_BLOB_URI_SCRIPT]: {
|
|
254
|
-
id:
|
|
254
|
+
id: 211,
|
|
255
255
|
code: VulnerabilityCode.HEADER_CSP_BLOB_URI_SCRIPT,
|
|
256
256
|
title: 'Content-Security-Policy Allows blob: in script-src',
|
|
257
257
|
description: 'The CSP allows blob: URIs for script execution, which can be abused to load attacker-controlled scripts in some contexts and weaken XSS mitigations.',
|
|
@@ -273,7 +273,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
273
273
|
remediation: 'Remove blob: from script-src unless strictly required. Use a narrower allowlist or nonces for trusted scripts.',
|
|
274
274
|
},
|
|
275
275
|
[VulnerabilityCode.HEADER_CSP_WILDCARD_DEFAULT]: {
|
|
276
|
-
id:
|
|
276
|
+
id: 212,
|
|
277
277
|
code: VulnerabilityCode.HEADER_CSP_WILDCARD_DEFAULT,
|
|
278
278
|
title: 'Content-Security-Policy default-src Uses Wildcard',
|
|
279
279
|
description: 'The CSP default-src directive allows all origins, which effectively disables the protection and allows untrusted content to load.',
|
|
@@ -295,7 +295,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
295
295
|
remediation: 'Replace wildcard default-src with explicit trusted origins and tighten resource-specific directives.',
|
|
296
296
|
},
|
|
297
297
|
[VulnerabilityCode.HEADER_CSP_NO_BASE_URI]: {
|
|
298
|
-
id:
|
|
298
|
+
id: 213,
|
|
299
299
|
code: VulnerabilityCode.HEADER_CSP_NO_BASE_URI,
|
|
300
300
|
title: 'Content-Security-Policy Missing base-uri Directive',
|
|
301
301
|
description: 'The CSP does not include a base-uri directive, allowing the base URL to be set by injected markup and enabling abuse of relative URL resolution.',
|
|
@@ -317,7 +317,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
317
317
|
remediation: 'Add base-uri \'self\' (or a strict allowlist) to CSP to prevent base tag abuse.',
|
|
318
318
|
},
|
|
319
319
|
[VulnerabilityCode.HEADER_CSP_NO_OBJECT_SRC]: {
|
|
320
|
-
id:
|
|
320
|
+
id: 214,
|
|
321
321
|
code: VulnerabilityCode.HEADER_CSP_NO_OBJECT_SRC,
|
|
322
322
|
title: 'Content-Security-Policy Missing object-src Directive',
|
|
323
323
|
description: 'The CSP does not include an object-src directive, allowing embedded objects to load from arbitrary origins and weakening defense-in-depth against plugin-based risks.',
|
|
@@ -339,7 +339,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
339
339
|
remediation: 'Add object-src \'none\' (or a strict allowlist) to CSP to prevent plugin content loading.',
|
|
340
340
|
},
|
|
341
341
|
[VulnerabilityCode.HEADER_CSP_NO_FRAME_ANCESTORS]: {
|
|
342
|
-
id:
|
|
342
|
+
id: 215,
|
|
343
343
|
code: VulnerabilityCode.HEADER_CSP_NO_FRAME_ANCESTORS,
|
|
344
344
|
title: 'Content-Security-Policy Missing frame-ancestors Directive',
|
|
345
345
|
description: 'The CSP does not include a frame-ancestors directive, leaving pages potentially frameable and vulnerable to clickjacking attacks.',
|
|
@@ -361,7 +361,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
361
361
|
remediation: 'Add frame-ancestors \'none\' or a strict allowlist to CSP to prevent clickjacking.',
|
|
362
362
|
},
|
|
363
363
|
[VulnerabilityCode.HEADER_CORS_MISCONFIGURED]: {
|
|
364
|
-
id:
|
|
364
|
+
id: 216,
|
|
365
365
|
code: VulnerabilityCode.HEADER_CORS_MISCONFIGURED,
|
|
366
366
|
title: 'CORS Misconfiguration',
|
|
367
367
|
description: 'Cross-Origin Resource Sharing is misconfigured with overly permissive Access-Control-Allow-Origin headers including wildcard (*) with credentials, or dynamic reflection of Origin header without proper validation, enabling cross-origin data theft.',
|
|
@@ -383,7 +383,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
383
383
|
remediation: 'Implement strict Origin validation with allowlist of trusted domains. Never reflect Origin header without validation. Do not use wildcard with Access-Control-Allow-Credentials.',
|
|
384
384
|
},
|
|
385
385
|
[VulnerabilityCode.HEADER_CORS_STAR_WITH_CREDENTIALS]: {
|
|
386
|
-
id:
|
|
386
|
+
id: 217,
|
|
387
387
|
code: VulnerabilityCode.HEADER_CORS_STAR_WITH_CREDENTIALS,
|
|
388
388
|
title: 'CORS Wildcard With Credentials',
|
|
389
389
|
description: 'Access-Control-Allow-Origin is set to * while Access-Control-Allow-Credentials is enabled, which browsers block but signals a dangerous CORS policy that can be misapplied in some environments.',
|
|
@@ -405,7 +405,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
405
405
|
remediation: 'Never use wildcard origins with credentials. Replace * with an explicit allowlist and set Vary: Origin.',
|
|
406
406
|
},
|
|
407
407
|
[VulnerabilityCode.HEADER_CORS_ORIGIN_REFLECT_NO_VARY]: {
|
|
408
|
-
id:
|
|
408
|
+
id: 218,
|
|
409
409
|
code: VulnerabilityCode.HEADER_CORS_ORIGIN_REFLECT_NO_VARY,
|
|
410
410
|
title: 'CORS Origin Reflection Without Vary',
|
|
411
411
|
description: 'The Origin header is reflected in Access-Control-Allow-Origin without Vary: Origin, which can lead to cache poisoning and unintended cross-origin access.',
|
|
@@ -427,7 +427,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
427
427
|
remediation: 'Validate origins against an allowlist and always include Vary: Origin when dynamically setting Access-Control-Allow-Origin.',
|
|
428
428
|
},
|
|
429
429
|
[VulnerabilityCode.HEADER_CORS_NULL_ORIGIN]: {
|
|
430
|
-
id:
|
|
430
|
+
id: 219,
|
|
431
431
|
code: VulnerabilityCode.HEADER_CORS_NULL_ORIGIN,
|
|
432
432
|
title: 'CORS Allows Null Origin',
|
|
433
433
|
description: 'Access-Control-Allow-Origin allows the null origin, enabling requests from opaque origins such as sandboxed iframes and file URLs that can be abused to access sensitive data.',
|
|
@@ -449,7 +449,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
449
449
|
remediation: 'Remove null from allowed origins. Restrict CORS to explicit trusted domains only.',
|
|
450
450
|
},
|
|
451
451
|
[VulnerabilityCode.HEADER_CORS_WILDCARD_SUBDOMAIN]: {
|
|
452
|
-
id:
|
|
452
|
+
id: 220,
|
|
453
453
|
code: VulnerabilityCode.HEADER_CORS_WILDCARD_SUBDOMAIN,
|
|
454
454
|
title: 'CORS Allows Wildcard Subdomains',
|
|
455
455
|
description: 'CORS policies allow wildcard subdomains that can be abused if any subdomain is compromised or can be controlled by untrusted parties.',
|
|
@@ -474,7 +474,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
474
474
|
// DIRECTORY BROWSING
|
|
475
475
|
// ========================================
|
|
476
476
|
[VulnerabilityCode.DIRBROWSE_GENERIC]: {
|
|
477
|
-
id:
|
|
477
|
+
id: 221,
|
|
478
478
|
code: VulnerabilityCode.DIRBROWSE_GENERIC,
|
|
479
479
|
title: 'Directory Listing Enabled (Generic)',
|
|
480
480
|
description: 'Directory listing is enabled and exposes directory contents to unauthenticated visitors, revealing application structure and file names.',
|
|
@@ -496,7 +496,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
496
496
|
remediation: 'Disable directory listing in the web server configuration and ensure directories have index files.',
|
|
497
497
|
},
|
|
498
498
|
[VulnerabilityCode.DIRBROWSE_GENERIC_SENSITIVE]: {
|
|
499
|
-
id:
|
|
499
|
+
id: 222,
|
|
500
500
|
code: VulnerabilityCode.DIRBROWSE_GENERIC_SENSITIVE,
|
|
501
501
|
title: 'Directory Listing Exposing Sensitive Content (Generic)',
|
|
502
502
|
description: 'Directory listing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -518,7 +518,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
518
518
|
remediation: 'Disable directory listing and remove sensitive files from web-accessible directories.',
|
|
519
519
|
},
|
|
520
520
|
[VulnerabilityCode.DIRBROWSE_APACHE]: {
|
|
521
|
-
id:
|
|
521
|
+
id: 223,
|
|
522
522
|
code: VulnerabilityCode.DIRBROWSE_APACHE,
|
|
523
523
|
title: 'Apache Autoindex Enabled',
|
|
524
524
|
description: 'Apache autoindex is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -540,7 +540,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
540
540
|
remediation: 'Disable autoindex in Apache (Options -Indexes) and add index files.',
|
|
541
541
|
},
|
|
542
542
|
[VulnerabilityCode.DIRBROWSE_APACHE_SENSITIVE]: {
|
|
543
|
-
id:
|
|
543
|
+
id: 224,
|
|
544
544
|
code: VulnerabilityCode.DIRBROWSE_APACHE_SENSITIVE,
|
|
545
545
|
title: 'Apache Autoindex Exposing Sensitive Content',
|
|
546
546
|
description: 'Apache autoindex is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -562,7 +562,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
562
562
|
remediation: 'Disable autoindex and remove sensitive files from web-accessible directories.',
|
|
563
563
|
},
|
|
564
564
|
[VulnerabilityCode.DIRBROWSE_NGINX]: {
|
|
565
|
-
id:
|
|
565
|
+
id: 225,
|
|
566
566
|
code: VulnerabilityCode.DIRBROWSE_NGINX,
|
|
567
567
|
title: 'Nginx Autoindex Enabled',
|
|
568
568
|
description: 'Nginx autoindex is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -584,7 +584,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
584
584
|
remediation: 'Disable autoindex in nginx (autoindex off) and add index files.',
|
|
585
585
|
},
|
|
586
586
|
[VulnerabilityCode.DIRBROWSE_NGINX_SENSITIVE]: {
|
|
587
|
-
id:
|
|
587
|
+
id: 226,
|
|
588
588
|
code: VulnerabilityCode.DIRBROWSE_NGINX_SENSITIVE,
|
|
589
589
|
title: 'Nginx Autoindex Exposing Sensitive Content',
|
|
590
590
|
description: 'Nginx autoindex is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -606,7 +606,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
606
606
|
remediation: 'Disable autoindex and remove sensitive files from web-accessible directories.',
|
|
607
607
|
},
|
|
608
608
|
[VulnerabilityCode.DIRBROWSE_IIS]: {
|
|
609
|
-
id:
|
|
609
|
+
id: 227,
|
|
610
610
|
code: VulnerabilityCode.DIRBROWSE_IIS,
|
|
611
611
|
title: 'IIS Directory Browsing Enabled',
|
|
612
612
|
description: 'IIS directory browsing is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -628,7 +628,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
628
628
|
remediation: 'Disable directory browsing in IIS and ensure directories have index files.',
|
|
629
629
|
},
|
|
630
630
|
[VulnerabilityCode.DIRBROWSE_IIS_SENSITIVE]: {
|
|
631
|
-
id:
|
|
631
|
+
id: 228,
|
|
632
632
|
code: VulnerabilityCode.DIRBROWSE_IIS_SENSITIVE,
|
|
633
633
|
title: 'IIS Directory Browsing Exposing Sensitive Content',
|
|
634
634
|
description: 'IIS directory browsing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -650,7 +650,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
650
650
|
remediation: 'Disable directory browsing and remove sensitive files from web-accessible directories.',
|
|
651
651
|
},
|
|
652
652
|
[VulnerabilityCode.DIRBROWSE_TOMCAT]: {
|
|
653
|
-
id:
|
|
653
|
+
id: 229,
|
|
654
654
|
code: VulnerabilityCode.DIRBROWSE_TOMCAT,
|
|
655
655
|
title: 'Tomcat Directory Listing Enabled',
|
|
656
656
|
description: 'Tomcat directory listing is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -672,7 +672,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
672
672
|
remediation: 'Disable directory listings in Tomcat and add index files to web directories.',
|
|
673
673
|
},
|
|
674
674
|
[VulnerabilityCode.DIRBROWSE_TOMCAT_SENSITIVE]: {
|
|
675
|
-
id:
|
|
675
|
+
id: 230,
|
|
676
676
|
code: VulnerabilityCode.DIRBROWSE_TOMCAT_SENSITIVE,
|
|
677
677
|
title: 'Tomcat Directory Listing Exposing Sensitive Content',
|
|
678
678
|
description: 'Tomcat directory listing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -694,7 +694,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
694
694
|
remediation: 'Disable directory listings and remove sensitive files from web-accessible directories.',
|
|
695
695
|
},
|
|
696
696
|
[VulnerabilityCode.DIRBROWSE_CADDY]: {
|
|
697
|
-
id:
|
|
697
|
+
id: 231,
|
|
698
698
|
code: VulnerabilityCode.DIRBROWSE_CADDY,
|
|
699
699
|
title: 'Caddy File Server Browsing Enabled',
|
|
700
700
|
description: 'Caddy file server browsing is enabled, exposing directory contents to unauthenticated visitors.',
|
|
@@ -716,7 +716,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
716
716
|
remediation: 'Disable file_server browse in Caddy or restrict browsing to trusted users.',
|
|
717
717
|
},
|
|
718
718
|
[VulnerabilityCode.DIRBROWSE_CADDY_SENSITIVE]: {
|
|
719
|
-
id:
|
|
719
|
+
id: 232,
|
|
720
720
|
code: VulnerabilityCode.DIRBROWSE_CADDY_SENSITIVE,
|
|
721
721
|
title: 'Caddy File Server Browsing Exposing Sensitive Content',
|
|
722
722
|
description: 'Caddy file server browsing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -738,7 +738,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
738
738
|
remediation: 'Disable file_server browse and remove sensitive files from web-accessible directories.',
|
|
739
739
|
},
|
|
740
740
|
[VulnerabilityCode.DIRBROWSE_WEBDAV]: {
|
|
741
|
-
id:
|
|
741
|
+
id: 233,
|
|
742
742
|
code: VulnerabilityCode.DIRBROWSE_WEBDAV,
|
|
743
743
|
title: 'WebDAV Directory Listing Enabled',
|
|
744
744
|
description: 'WebDAV responses expose directory contents, allowing unauthenticated browsing of files and folders.',
|
|
@@ -760,7 +760,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
760
760
|
remediation: 'Disable unauthenticated WebDAV browsing or restrict access with authentication and authorization.',
|
|
761
761
|
},
|
|
762
762
|
[VulnerabilityCode.DIRBROWSE_WEBDAV_SENSITIVE]: {
|
|
763
|
-
id:
|
|
763
|
+
id: 234,
|
|
764
764
|
code: VulnerabilityCode.DIRBROWSE_WEBDAV_SENSITIVE,
|
|
765
765
|
title: 'WebDAV Directory Listing Exposing Sensitive Content',
|
|
766
766
|
description: 'WebDAV responses expose directories containing sensitive files such as backups, credentials, or configuration artifacts.',
|
|
@@ -782,7 +782,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
782
782
|
remediation: 'Disable unauthenticated WebDAV browsing and remove sensitive files from exposed directories.',
|
|
783
783
|
},
|
|
784
784
|
[VulnerabilityCode.DIRBROWSE_S3]: {
|
|
785
|
-
id:
|
|
785
|
+
id: 235,
|
|
786
786
|
code: VulnerabilityCode.DIRBROWSE_S3,
|
|
787
787
|
title: 'S3 Bucket Listing Enabled',
|
|
788
788
|
description: 'An S3 bucket listing is exposed, allowing unauthenticated enumeration of object keys.',
|
|
@@ -804,7 +804,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
804
804
|
remediation: 'Disable public ListBucket access and restrict bucket policies to authorized principals.',
|
|
805
805
|
},
|
|
806
806
|
[VulnerabilityCode.DIRBROWSE_S3_SENSITIVE]: {
|
|
807
|
-
id:
|
|
807
|
+
id: 236,
|
|
808
808
|
code: VulnerabilityCode.DIRBROWSE_S3_SENSITIVE,
|
|
809
809
|
title: 'S3 Bucket Listing Exposing Sensitive Content',
|
|
810
810
|
description: 'An S3 bucket listing is exposed and includes sensitive objects such as backups, credentials, or configuration artifacts.',
|
|
@@ -826,7 +826,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
826
826
|
remediation: 'Remove public ListBucket access and rotate any exposed credentials or secrets.',
|
|
827
827
|
},
|
|
828
828
|
[VulnerabilityCode.DIRBROWSE_GCS]: {
|
|
829
|
-
id:
|
|
829
|
+
id: 237,
|
|
830
830
|
code: VulnerabilityCode.DIRBROWSE_GCS,
|
|
831
831
|
title: 'GCS Bucket Listing Enabled',
|
|
832
832
|
description: 'A Google Cloud Storage bucket listing is exposed, allowing unauthenticated enumeration of object keys.',
|
|
@@ -848,7 +848,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
848
848
|
remediation: 'Restrict bucket IAM policies to authorized principals and disable anonymous listing.',
|
|
849
849
|
},
|
|
850
850
|
[VulnerabilityCode.DIRBROWSE_GCS_SENSITIVE]: {
|
|
851
|
-
id:
|
|
851
|
+
id: 238,
|
|
852
852
|
code: VulnerabilityCode.DIRBROWSE_GCS_SENSITIVE,
|
|
853
853
|
title: 'GCS Bucket Listing Exposing Sensitive Content',
|
|
854
854
|
description: 'A Google Cloud Storage bucket listing is exposed and includes sensitive objects such as backups, credentials, or configuration artifacts.',
|
|
@@ -870,7 +870,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
870
870
|
remediation: 'Remove public listing access and rotate any exposed credentials or secrets.',
|
|
871
871
|
},
|
|
872
872
|
[VulnerabilityCode.DIRBROWSE_AZURE_BLOB]: {
|
|
873
|
-
id:
|
|
873
|
+
id: 239,
|
|
874
874
|
code: VulnerabilityCode.DIRBROWSE_AZURE_BLOB,
|
|
875
875
|
title: 'Azure Blob Container Listing Enabled',
|
|
876
876
|
description: 'An Azure Blob container listing is exposed, allowing unauthenticated enumeration of blob names.',
|
|
@@ -892,7 +892,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
892
892
|
remediation: 'Disable public container listing and restrict access via SAS tokens or RBAC.',
|
|
893
893
|
},
|
|
894
894
|
[VulnerabilityCode.DIRBROWSE_AZURE_BLOB_SENSITIVE]: {
|
|
895
|
-
id:
|
|
895
|
+
id: 240,
|
|
896
896
|
code: VulnerabilityCode.DIRBROWSE_AZURE_BLOB_SENSITIVE,
|
|
897
897
|
title: 'Azure Blob Container Listing Exposing Sensitive Content',
|
|
898
898
|
description: 'An Azure Blob container listing is exposed and includes sensitive blobs such as backups, credentials, or configuration artifacts.',
|
|
@@ -915,7 +915,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
915
915
|
},
|
|
916
916
|
// Legacy generic codes (keep for backward compatibility)
|
|
917
917
|
[VulnerabilityCode.DIRBROWSE_ENABLED]: {
|
|
918
|
-
id:
|
|
918
|
+
id: 241,
|
|
919
919
|
code: VulnerabilityCode.DIRBROWSE_ENABLED,
|
|
920
920
|
title: 'Directory Listing Enabled',
|
|
921
921
|
description: 'Web server directory listing is enabled, exposing the contents of directories to anyone who browses to them without an index file. This reveals application structure, backup files, configuration files, and potentially sensitive data to attackers.',
|
|
@@ -937,7 +937,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
937
937
|
remediation: 'Disable directory listing in web server configuration (Options -Indexes in Apache, autoindex off in nginx). Ensure all directories have proper index files.',
|
|
938
938
|
},
|
|
939
939
|
[VulnerabilityCode.DIRBROWSE_SENSITIVE]: {
|
|
940
|
-
id:
|
|
940
|
+
id: 242,
|
|
941
941
|
code: VulnerabilityCode.DIRBROWSE_SENSITIVE,
|
|
942
942
|
title: 'Directory Listing Exposing Sensitive Content',
|
|
943
943
|
description: 'Directory listing is enabled on a directory containing sensitive files like backups, configuration files, source code, or credentials. This elevates the risk significantly as attackers can directly access sensitive information without guessing filenames.',
|
|
@@ -962,7 +962,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
962
962
|
// CLICKJACKING
|
|
963
963
|
// ========================================
|
|
964
964
|
[VulnerabilityCode.CLICK_FRAMEABLE]: {
|
|
965
|
-
id:
|
|
965
|
+
id: 243,
|
|
966
966
|
code: VulnerabilityCode.CLICK_FRAMEABLE,
|
|
967
967
|
title: 'Clickjacking - Page Frameable',
|
|
968
968
|
description: 'The application pages can be embedded in iframes on malicious websites, enabling clickjacking attacks where attackers overlay transparent frames over deceptive UI elements to trick users into clicking hidden buttons or links that perform unintended actions.',
|
|
@@ -987,7 +987,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
987
987
|
// DESERIALIZATION
|
|
988
988
|
// ========================================
|
|
989
989
|
[VulnerabilityCode.DESER_JAVA]: {
|
|
990
|
-
id:
|
|
990
|
+
id: 244,
|
|
991
991
|
code: VulnerabilityCode.DESER_JAVA,
|
|
992
992
|
title: 'Insecure Deserialization - Java',
|
|
993
993
|
description: 'Critical Java deserialization vulnerability where untrusted serialized objects are processed, allowing attackers to achieve remote code execution through gadget chains in common libraries like Apache Commons Collections, Spring Framework, or other classpath dependencies.',
|
|
@@ -1009,7 +1009,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1009
1009
|
remediation: 'Do not deserialize untrusted data. Use JSON or XML instead of Java serialization. Implement ObjectInputFilter (JEP 290) to restrict deserializable classes. Remove vulnerable gadget libraries.',
|
|
1010
1010
|
},
|
|
1011
1011
|
[VulnerabilityCode.DESER_PHP]: {
|
|
1012
|
-
id:
|
|
1012
|
+
id: 245,
|
|
1013
1013
|
code: VulnerabilityCode.DESER_PHP,
|
|
1014
1014
|
title: 'Insecure Deserialization - PHP',
|
|
1015
1015
|
description: 'Critical PHP deserialization vulnerability where unserialize() processes attacker-controlled data, enabling object injection attacks through magic methods like __wakeup(), __destruct(), or __toString() in application or framework classes for remote code execution.',
|
|
@@ -1031,7 +1031,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1031
1031
|
remediation: 'Never pass user input to unserialize(). Use json_decode() instead. If serialization is required, use allowed_classes option with explicit allowlist. Audit code for pop chains.',
|
|
1032
1032
|
},
|
|
1033
1033
|
[VulnerabilityCode.DESER_PYTHON]: {
|
|
1034
|
-
id:
|
|
1034
|
+
id: 246,
|
|
1035
1035
|
code: VulnerabilityCode.DESER_PYTHON,
|
|
1036
1036
|
title: 'Insecure Deserialization - Python',
|
|
1037
1037
|
description: 'Critical Python deserialization vulnerability through pickle/cPickle processing of untrusted data, enabling remote code execution via __reduce__ method exploitation. Python pickle is inherently unsafe and should never process untrusted input.',
|
|
@@ -1053,7 +1053,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1053
1053
|
remediation: 'Never pickle untrusted data. Use JSON or other safe formats. If pickle is required, use cryptographic signatures to verify data integrity before deserialization.',
|
|
1054
1054
|
},
|
|
1055
1055
|
[VulnerabilityCode.DESER_DOTNET]: {
|
|
1056
|
-
id:
|
|
1056
|
+
id: 247,
|
|
1057
1057
|
code: VulnerabilityCode.DESER_DOTNET,
|
|
1058
1058
|
title: 'Insecure Deserialization - .NET',
|
|
1059
1059
|
description: 'Critical .NET deserialization vulnerability through BinaryFormatter, ObjectStateFormatter, LosFormatter, or other dangerous formatters processing untrusted data, enabling remote code execution through gadget chains in the .NET runtime or third-party libraries.',
|
|
@@ -1075,7 +1075,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1075
1075
|
remediation: 'Avoid BinaryFormatter for untrusted data. Use System.Text.Json or XmlSerializer with known types. For legacy code, implement SerializationBinder to restrict deserializable types.',
|
|
1076
1076
|
},
|
|
1077
1077
|
[VulnerabilityCode.DESER_RUBY]: {
|
|
1078
|
-
id:
|
|
1078
|
+
id: 248,
|
|
1079
1079
|
code: VulnerabilityCode.DESER_RUBY,
|
|
1080
1080
|
title: 'Insecure Deserialization - Ruby',
|
|
1081
1081
|
description: 'Critical Ruby deserialization vulnerability through Marshal.load or YAML.load processing untrusted data, enabling remote code execution through Ruby object instantiation gadgets that execute arbitrary code during object reconstruction.',
|
|
@@ -1097,7 +1097,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1097
1097
|
remediation: 'Never Marshal.load untrusted data. Use JSON.parse instead. For YAML, use YAML.safe_load with permitted_classes option. Sign serialized data with HMAC for integrity.',
|
|
1098
1098
|
},
|
|
1099
1099
|
[VulnerabilityCode.DESER_NODE]: {
|
|
1100
|
-
id:
|
|
1100
|
+
id: 249,
|
|
1101
1101
|
code: VulnerabilityCode.DESER_NODE,
|
|
1102
1102
|
title: 'Insecure Deserialization - Node.js',
|
|
1103
1103
|
description: 'Critical Node.js deserialization vulnerability through node-serialize, funcster, or similar libraries that execute JavaScript during deserialization, enabling remote code execution when attacker-controlled serialized data containing functions or IIFE is processed.',
|
|
@@ -1119,7 +1119,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1119
1119
|
remediation: 'Never use serialization libraries that can deserialize functions. Use JSON.parse() for data interchange. Avoid node-serialize and similar libraries. Implement input validation.',
|
|
1120
1120
|
},
|
|
1121
1121
|
[VulnerabilityCode.CLICK_PARTIAL_PROTECTION]: {
|
|
1122
|
-
id:
|
|
1122
|
+
id: 250,
|
|
1123
1123
|
code: VulnerabilityCode.CLICK_PARTIAL_PROTECTION,
|
|
1124
1124
|
title: 'Clickjacking - Partial Protection',
|
|
1125
1125
|
description: 'Incomplete clickjacking protection where X-Frame-Options or frame-ancestors CSP is only applied on some pages, uses weak values like ALLOW-FROM with bypassable origins, or has inconsistent implementation allowing certain pages to be framed.',
|
|
@@ -1141,7 +1141,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1141
1141
|
remediation: 'Apply consistent frame protection across all pages. Use DENY or SAMEORIGIN rather than ALLOW-FROM. Audit all endpoints for missing protection. Use CSP frame-ancestors instead of X-Frame-Options.',
|
|
1142
1142
|
},
|
|
1143
1143
|
[VulnerabilityCode.HEADER_MISSING_XCONTENT_TYPE]: {
|
|
1144
|
-
id:
|
|
1144
|
+
id: 251,
|
|
1145
1145
|
code: VulnerabilityCode.HEADER_MISSING_XCONTENT_TYPE,
|
|
1146
1146
|
title: 'Missing Security Header - X-Content-Type-Options',
|
|
1147
1147
|
description: 'The application does not set X-Content-Type-Options: nosniff header, allowing browsers to perform MIME-type sniffing that can lead to XSS attacks when user-uploaded content is served with incorrect Content-Type and browsers execute it as script.',
|
|
@@ -1163,7 +1163,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1163
1163
|
remediation: 'Add X-Content-Type-Options: nosniff header to all responses. Ensure correct Content-Type headers are set for all resources. Validate file types before serving user uploads.',
|
|
1164
1164
|
},
|
|
1165
1165
|
[VulnerabilityCode.HEADER_XCONTENT_TYPE_INVALID]: {
|
|
1166
|
-
id:
|
|
1166
|
+
id: 252,
|
|
1167
1167
|
code: VulnerabilityCode.HEADER_XCONTENT_TYPE_INVALID,
|
|
1168
1168
|
title: 'Invalid Security Header - X-Content-Type-Options',
|
|
1169
1169
|
description: 'The X-Content-Type-Options header is present but misconfigured (not set to nosniff), which can allow MIME sniffing and reduce protection against content-type confusion.',
|
|
@@ -1185,7 +1185,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1185
1185
|
remediation: 'Set X-Content-Type-Options to nosniff on all responses to prevent MIME sniffing.',
|
|
1186
1186
|
},
|
|
1187
1187
|
[VulnerabilityCode.HEADER_MISSING_REFERRER_POLICY]: {
|
|
1188
|
-
id:
|
|
1188
|
+
id: 253,
|
|
1189
1189
|
code: VulnerabilityCode.HEADER_MISSING_REFERRER_POLICY,
|
|
1190
1190
|
title: 'Missing Security Header - Referrer-Policy',
|
|
1191
1191
|
description: 'The application does not implement Referrer-Policy header, potentially leaking sensitive URL information including session tokens, user IDs, or query parameters to external sites when users click links or resources are loaded from third-party domains.',
|
|
@@ -1207,7 +1207,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1207
1207
|
remediation: 'Implement Referrer-Policy header with strict-origin-when-cross-origin or no-referrer policy. Avoid passing sensitive data in URLs. Use POST requests for sensitive operations.',
|
|
1208
1208
|
},
|
|
1209
1209
|
[VulnerabilityCode.HEADER_REFERRER_POLICY_UNSAFE]: {
|
|
1210
|
-
id:
|
|
1210
|
+
id: 254,
|
|
1211
1211
|
code: VulnerabilityCode.HEADER_REFERRER_POLICY_UNSAFE,
|
|
1212
1212
|
title: 'Unsafe Referrer-Policy Configuration',
|
|
1213
1213
|
description: 'The Referrer-Policy header is set to a permissive value that can leak full URLs and sensitive query parameters to external origins.',
|
|
@@ -1229,7 +1229,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1229
1229
|
remediation: 'Use strict-origin-when-cross-origin or no-referrer to minimize leakage of sensitive URL data.',
|
|
1230
1230
|
},
|
|
1231
1231
|
[VulnerabilityCode.HEADER_MISSING_PERMISSIONS_POLICY]: {
|
|
1232
|
-
id:
|
|
1232
|
+
id: 255,
|
|
1233
1233
|
code: VulnerabilityCode.HEADER_MISSING_PERMISSIONS_POLICY,
|
|
1234
1234
|
title: 'Missing Security Header - Permissions-Policy',
|
|
1235
1235
|
description: 'The application does not implement Permissions-Policy (formerly Feature-Policy) header, allowing embedded frames or malicious scripts to access sensitive browser features like camera, microphone, geolocation, or payment APIs without explicit permission.',
|
|
@@ -1251,7 +1251,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1251
1251
|
remediation: 'Add Permissions-Policy header restricting access to sensitive features. Disable features not needed by the application. Use () syntax to disallow features for all origins.',
|
|
1252
1252
|
},
|
|
1253
1253
|
[VulnerabilityCode.HEADER_MISSING_XSS_PROTECTION]: {
|
|
1254
|
-
id:
|
|
1254
|
+
id: 256,
|
|
1255
1255
|
code: VulnerabilityCode.HEADER_MISSING_XSS_PROTECTION,
|
|
1256
1256
|
title: 'Missing Security Header - X-XSS-Protection',
|
|
1257
1257
|
description: 'The legacy X-XSS-Protection header is not set. While deprecated in modern browsers, it can provide defense-in-depth for older browsers that still honor this header for their built-in XSS auditor feature.',
|
|
@@ -1273,7 +1273,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1273
1273
|
remediation: 'Set X-XSS-Protection: 0 to disable (recommended per OWASP) or use CSP instead. The XSS auditor has been removed from modern browsers due to security issues with block mode.',
|
|
1274
1274
|
},
|
|
1275
1275
|
[VulnerabilityCode.HEADER_COEP_WITHOUT_COOP]: {
|
|
1276
|
-
id:
|
|
1276
|
+
id: 257,
|
|
1277
1277
|
code: VulnerabilityCode.HEADER_COEP_WITHOUT_COOP,
|
|
1278
1278
|
title: 'Header Misconfiguration - COEP Without COOP',
|
|
1279
1279
|
description: 'Cross-Origin-Embedder-Policy (COEP) is set without Cross-Origin-Opener-Policy (COOP), which can create inconsistent cross-origin isolation behavior and indicate incomplete or misapplied security header strategy for isolation-sensitive applications.',
|
|
@@ -1295,7 +1295,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1295
1295
|
remediation: 'If cross-origin isolation is required, deploy COEP together with COOP and validate the intended policy combination. Otherwise remove COEP to avoid confusing or inconsistent isolation posture.',
|
|
1296
1296
|
},
|
|
1297
1297
|
[VulnerabilityCode.HEADER_CORP_UNUSUAL]: {
|
|
1298
|
-
id:
|
|
1298
|
+
id: 258,
|
|
1299
1299
|
code: VulnerabilityCode.HEADER_CORP_UNUSUAL,
|
|
1300
1300
|
title: 'Header Misconfiguration - Unusual CORP Value',
|
|
1301
1301
|
description: 'Cross-Origin-Resource-Policy (CORP) is set to a non-standard value, which may indicate a misconfiguration that provides no effective protection or creates unpredictable resource loading behavior across origins.',
|
|
@@ -1317,7 +1317,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1317
1317
|
remediation: 'Use valid CORP values (same-origin, same-site, or cross-origin) and confirm the chosen policy aligns with the resource sharing model of the application.',
|
|
1318
1318
|
},
|
|
1319
1319
|
[VulnerabilityCode.HEADER_EXPECT_CT_PRESENT]: {
|
|
1320
|
-
id:
|
|
1320
|
+
id: 259,
|
|
1321
1321
|
code: VulnerabilityCode.HEADER_EXPECT_CT_PRESENT,
|
|
1322
1322
|
title: 'Deprecated Header - Expect-CT Present',
|
|
1323
1323
|
description: 'The Expect-CT header is present even though the feature is deprecated and no longer enforced by major browsers, adding unnecessary configuration surface without meaningful security benefit.',
|
|
@@ -1339,7 +1339,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1339
1339
|
remediation: 'Remove Expect-CT unless you have a legacy operational requirement, and focus on TLS configuration and certificate transparency monitoring via modern tooling.',
|
|
1340
1340
|
},
|
|
1341
1341
|
[VulnerabilityCode.HEADER_SERVER_HEADER_PRESENT]: {
|
|
1342
|
-
id:
|
|
1342
|
+
id: 260,
|
|
1343
1343
|
code: VulnerabilityCode.HEADER_SERVER_HEADER_PRESENT,
|
|
1344
1344
|
title: 'Information Exposure - Server Header Present',
|
|
1345
1345
|
description: 'The Server header reveals technology or version details that can assist attackers with fingerprinting and targeted exploitation, increasing the likelihood of tailored attacks against known software weaknesses.',
|
|
@@ -1361,7 +1361,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1361
1361
|
remediation: 'Configure the web server or reverse proxy to minimize or remove Server header details and avoid exposing version strings in responses.',
|
|
1362
1362
|
},
|
|
1363
1363
|
[VulnerabilityCode.HEADER_X_POWERED_BY_PRESENT]: {
|
|
1364
|
-
id:
|
|
1364
|
+
id: 261,
|
|
1365
1365
|
code: VulnerabilityCode.HEADER_X_POWERED_BY_PRESENT,
|
|
1366
1366
|
title: 'Information Exposure - X-Powered-By Present',
|
|
1367
1367
|
description: 'The X-Powered-By header discloses framework or runtime information that can be used to fingerprint the application stack and target known vulnerabilities in specific platforms or versions.',
|
|
@@ -1383,7 +1383,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1383
1383
|
remediation: 'Disable X-Powered-By headers in application frameworks or reverse proxies to reduce stack fingerprinting exposure.',
|
|
1384
1384
|
},
|
|
1385
1385
|
[VulnerabilityCode.HEADER_X_XSS_PROTECTION_ENABLED]: {
|
|
1386
|
-
id:
|
|
1386
|
+
id: 262,
|
|
1387
1387
|
code: VulnerabilityCode.HEADER_X_XSS_PROTECTION_ENABLED,
|
|
1388
1388
|
title: 'Deprecated Header - X-XSS-Protection Enabled',
|
|
1389
1389
|
description: 'The X-XSS-Protection header is enabled, which is deprecated and can introduce security risks or inconsistent behavior in legacy browsers due to the removed XSS auditor feature.',
|
|
@@ -1405,7 +1405,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1405
1405
|
remediation: 'Prefer modern CSP protections and set X-XSS-Protection: 0 or remove the header to avoid relying on deprecated behavior.',
|
|
1406
1406
|
},
|
|
1407
1407
|
[VulnerabilityCode.COOKIE_SAMESITE_NONE_WITHOUT_SECURE]: {
|
|
1408
|
-
id:
|
|
1408
|
+
id: 263,
|
|
1409
1409
|
code: VulnerabilityCode.COOKIE_SAMESITE_NONE_WITHOUT_SECURE,
|
|
1410
1410
|
title: 'Cookie Misconfiguration - SameSite=None Without Secure',
|
|
1411
1411
|
description: 'A cookie is configured with SameSite=None but lacks the Secure attribute, enabling cross-site transmission over unencrypted connections and undermining cookie integrity and confidentiality controls.',
|
|
@@ -1427,7 +1427,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1427
1427
|
remediation: 'Set Secure when SameSite=None is used and ensure the application is served exclusively over HTTPS.',
|
|
1428
1428
|
},
|
|
1429
1429
|
[VulnerabilityCode.COOKIE_SESSION_MISSING_SECURE]: {
|
|
1430
|
-
id:
|
|
1430
|
+
id: 264,
|
|
1431
1431
|
code: VulnerabilityCode.COOKIE_SESSION_MISSING_SECURE,
|
|
1432
1432
|
title: 'Cookie Misconfiguration - Session Cookie Missing Secure',
|
|
1433
1433
|
description: 'Session or authentication cookies are missing the Secure attribute, allowing them to be transmitted over unencrypted connections and increasing the risk of session hijacking or credential theft.',
|
|
@@ -1449,7 +1449,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1449
1449
|
remediation: 'Apply the Secure attribute to all session cookies and enforce HTTPS with HSTS to prevent downgrade to plaintext.',
|
|
1450
1450
|
},
|
|
1451
1451
|
[VulnerabilityCode.COOKIE_MISSING_SECURE]: {
|
|
1452
|
-
id:
|
|
1452
|
+
id: 265,
|
|
1453
1453
|
code: VulnerabilityCode.COOKIE_MISSING_SECURE,
|
|
1454
1454
|
title: 'Cookie Misconfiguration - Missing Secure Attribute',
|
|
1455
1455
|
description: 'Cookies are set without the Secure attribute, permitting transmission over plaintext HTTP and exposing cookie contents to network interception or manipulation.',
|
|
@@ -1471,7 +1471,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1471
1471
|
remediation: 'Set the Secure attribute on cookies that should only be transmitted over HTTPS.',
|
|
1472
1472
|
},
|
|
1473
1473
|
[VulnerabilityCode.COOKIE_SESSION_MISSING_HTTPONLY]: {
|
|
1474
|
-
id:
|
|
1474
|
+
id: 266,
|
|
1475
1475
|
code: VulnerabilityCode.COOKIE_SESSION_MISSING_HTTPONLY,
|
|
1476
1476
|
title: 'Cookie Misconfiguration - Session Cookie Missing HttpOnly',
|
|
1477
1477
|
description: 'Session or authentication cookies are missing the HttpOnly attribute, allowing client-side scripts to access sensitive cookie values and increasing the impact of XSS attacks.',
|
|
@@ -1493,7 +1493,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1493
1493
|
remediation: 'Set HttpOnly on session cookies to reduce access from client-side scripts and pair with CSP to mitigate XSS risk.',
|
|
1494
1494
|
},
|
|
1495
1495
|
[VulnerabilityCode.COOKIE_MISSING_HTTPONLY]: {
|
|
1496
|
-
id:
|
|
1496
|
+
id: 267,
|
|
1497
1497
|
code: VulnerabilityCode.COOKIE_MISSING_HTTPONLY,
|
|
1498
1498
|
title: 'Cookie Misconfiguration - Missing HttpOnly Attribute',
|
|
1499
1499
|
description: 'Cookies are missing the HttpOnly attribute, allowing JavaScript access to cookie values and increasing the potential impact of client-side script injection.',
|
|
@@ -1515,7 +1515,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1515
1515
|
remediation: 'Add HttpOnly to cookies that should not be accessed by JavaScript to reduce the impact of XSS.',
|
|
1516
1516
|
},
|
|
1517
1517
|
[VulnerabilityCode.COOKIE_MISSING_SAMESITE]: {
|
|
1518
|
-
id:
|
|
1518
|
+
id: 268,
|
|
1519
1519
|
code: VulnerabilityCode.COOKIE_MISSING_SAMESITE,
|
|
1520
1520
|
title: 'Cookie Misconfiguration - Missing SameSite Attribute',
|
|
1521
1521
|
description: 'Cookies do not specify SameSite, which can allow cross-site requests to include cookies by default and increase exposure to CSRF-style attacks or cross-site leakage.',
|
|
@@ -1537,7 +1537,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1537
1537
|
remediation: 'Set SameSite=Lax for general cookies or SameSite=Strict where appropriate to reduce cross-site cookie inclusion.',
|
|
1538
1538
|
},
|
|
1539
1539
|
[VulnerabilityCode.COOKIE_HOST_PREFIX_INVALID]: {
|
|
1540
|
-
id:
|
|
1540
|
+
id: 269,
|
|
1541
1541
|
code: VulnerabilityCode.COOKIE_HOST_PREFIX_INVALID,
|
|
1542
1542
|
title: 'Cookie Misconfiguration - __Host- Prefix Violations',
|
|
1543
1543
|
description: 'Cookies with the __Host- prefix do not meet required attributes (Secure, Path=/, no Domain), weakening the protections provided by host-only cookie semantics.',
|
|
@@ -1559,7 +1559,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1559
1559
|
remediation: 'Ensure __Host- cookies include Secure, Path=/, and omit the Domain attribute to preserve host-only guarantees.',
|
|
1560
1560
|
},
|
|
1561
1561
|
[VulnerabilityCode.COOKIE_SECURE_PREFIX_INVALID]: {
|
|
1562
|
-
id:
|
|
1562
|
+
id: 270,
|
|
1563
1563
|
code: VulnerabilityCode.COOKIE_SECURE_PREFIX_INVALID,
|
|
1564
1564
|
title: 'Cookie Misconfiguration - __Secure- Prefix Violations',
|
|
1565
1565
|
description: 'Cookies with the __Secure- prefix are missing the Secure attribute, which defeats the prefix requirement and weakens transport security protections.',
|
|
@@ -1581,7 +1581,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1581
1581
|
remediation: 'Set the Secure attribute for all __Secure- cookies and ensure HTTPS is enforced across the application.',
|
|
1582
1582
|
},
|
|
1583
1583
|
[VulnerabilityCode.HEADER_DRIFT_CSP]: {
|
|
1584
|
-
id:
|
|
1584
|
+
id: 271,
|
|
1585
1585
|
code: VulnerabilityCode.HEADER_DRIFT_CSP,
|
|
1586
1586
|
title: 'Header Drift - Content-Security-Policy Inconsistent',
|
|
1587
1587
|
description: 'Content-Security-Policy is present on some paths but missing on others, creating uneven defenses and potentially exposing unprotected routes to script injection or content loading risks.',
|
|
@@ -1603,7 +1603,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1603
1603
|
remediation: 'Apply CSP consistently across relevant responses, including error and authentication pages, to avoid gaps in policy coverage.',
|
|
1604
1604
|
},
|
|
1605
1605
|
[VulnerabilityCode.HEADER_DRIFT_HSTS]: {
|
|
1606
|
-
id:
|
|
1606
|
+
id: 272,
|
|
1607
1607
|
code: VulnerabilityCode.HEADER_DRIFT_HSTS,
|
|
1608
1608
|
title: 'Header Drift - Strict-Transport-Security Inconsistent',
|
|
1609
1609
|
description: 'Strict-Transport-Security is present on some paths but missing on others, reducing the effectiveness of HTTPS enforcement and creating mixed transport behavior across the site.',
|
|
@@ -1625,7 +1625,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1625
1625
|
remediation: 'Ensure HSTS is set uniformly on HTTPS responses so the browser can enforce strict transport for the entire origin.',
|
|
1626
1626
|
},
|
|
1627
1627
|
[VulnerabilityCode.HEADER_DRIFT_XCONTENT_TYPE]: {
|
|
1628
|
-
id:
|
|
1628
|
+
id: 273,
|
|
1629
1629
|
code: VulnerabilityCode.HEADER_DRIFT_XCONTENT_TYPE,
|
|
1630
1630
|
title: 'Header Drift - X-Content-Type-Options Inconsistent',
|
|
1631
1631
|
description: 'X-Content-Type-Options is present on some paths but missing on others, allowing inconsistent MIME sniffing behavior that could expose unprotected routes to content-type confusion.',
|
|
@@ -1647,7 +1647,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1647
1647
|
remediation: 'Apply X-Content-Type-Options: nosniff across all relevant responses to avoid inconsistent browser behavior.',
|
|
1648
1648
|
},
|
|
1649
1649
|
[VulnerabilityCode.HEADER_DRIFT_REFERRER_POLICY]: {
|
|
1650
|
-
id:
|
|
1650
|
+
id: 274,
|
|
1651
1651
|
code: VulnerabilityCode.HEADER_DRIFT_REFERRER_POLICY,
|
|
1652
1652
|
title: 'Header Drift - Referrer-Policy Inconsistent',
|
|
1653
1653
|
description: 'Referrer-Policy is present on some paths but missing on others, leading to inconsistent referrer leakage controls and potential exposure of sensitive URL data.',
|
|
@@ -1669,7 +1669,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1669
1669
|
remediation: 'Set a consistent Referrer-Policy across responses to standardize referrer leakage controls.',
|
|
1670
1670
|
},
|
|
1671
1671
|
[VulnerabilityCode.HEADER_DRIFT_XFRAME]: {
|
|
1672
|
-
id:
|
|
1672
|
+
id: 275,
|
|
1673
1673
|
code: VulnerabilityCode.HEADER_DRIFT_XFRAME,
|
|
1674
1674
|
title: 'Header Drift - X-Frame-Options Inconsistent',
|
|
1675
1675
|
description: 'X-Frame-Options or equivalent framing controls are present on some paths but missing on others, creating uneven clickjacking protection across the site.',
|
|
@@ -1691,7 +1691,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1691
1691
|
remediation: 'Apply X-Frame-Options or CSP frame-ancestors consistently to avoid unprotected pages.',
|
|
1692
1692
|
},
|
|
1693
1693
|
[VulnerabilityCode.HEADER_DRIFT_PERMISSIONS_POLICY]: {
|
|
1694
|
-
id:
|
|
1694
|
+
id: 276,
|
|
1695
1695
|
code: VulnerabilityCode.HEADER_DRIFT_PERMISSIONS_POLICY,
|
|
1696
1696
|
title: 'Header Drift - Permissions-Policy Inconsistent',
|
|
1697
1697
|
description: 'Permissions-Policy is present on some paths but missing on others, leading to inconsistent controls over browser features such as geolocation, camera, or microphone.',
|
|
@@ -1713,7 +1713,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1713
1713
|
remediation: 'Apply Permissions-Policy consistently for pages that should restrict access to sensitive browser features.',
|
|
1714
1714
|
},
|
|
1715
1715
|
[VulnerabilityCode.HEADER_DRIFT_COOP]: {
|
|
1716
|
-
id:
|
|
1716
|
+
id: 277,
|
|
1717
1717
|
code: VulnerabilityCode.HEADER_DRIFT_COOP,
|
|
1718
1718
|
title: 'Header Drift - COOP Inconsistent',
|
|
1719
1719
|
description: 'Cross-Origin-Opener-Policy is present on some paths but missing on others, which can lead to uneven cross-origin isolation guarantees and inconsistent window isolation behavior.',
|
|
@@ -1735,7 +1735,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1735
1735
|
remediation: 'Apply COOP consistently where cross-origin isolation is required and validate the policy across all relevant routes.',
|
|
1736
1736
|
},
|
|
1737
1737
|
[VulnerabilityCode.HEADER_DRIFT_COEP]: {
|
|
1738
|
-
id:
|
|
1738
|
+
id: 278,
|
|
1739
1739
|
code: VulnerabilityCode.HEADER_DRIFT_COEP,
|
|
1740
1740
|
title: 'Header Drift - COEP Inconsistent',
|
|
1741
1741
|
description: 'Cross-Origin-Embedder-Policy is present on some paths but missing on others, resulting in inconsistent embedding restrictions and cross-origin isolation posture.',
|
|
@@ -1757,7 +1757,7 @@ export const CONFIG_VULNERABILITIES = {
|
|
|
1757
1757
|
remediation: 'Apply COEP consistently on routes that are intended to enforce cross-origin embedding controls.',
|
|
1758
1758
|
},
|
|
1759
1759
|
[VulnerabilityCode.HEADER_DRIFT_CORP]: {
|
|
1760
|
-
id:
|
|
1760
|
+
id: 279,
|
|
1761
1761
|
code: VulnerabilityCode.HEADER_DRIFT_CORP,
|
|
1762
1762
|
title: 'Header Drift - CORP Inconsistent',
|
|
1763
1763
|
description: 'Cross-Origin-Resource-Policy is present on some paths but missing on others, which can leave inconsistent controls on resource sharing and embedding across the application.',
|