circle-ir 3.18.1 → 3.18.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -156,6 +156,20 @@
|
|
|
156
156
|
"cwe": "CWE-79",
|
|
157
157
|
"severity": "medium",
|
|
158
158
|
"note": "CSS injection via style.cssText"
|
|
159
|
+
},
|
|
160
|
+
{
|
|
161
|
+
"property": "background",
|
|
162
|
+
"type": "css_injection",
|
|
163
|
+
"cwe": "CWE-79",
|
|
164
|
+
"severity": "medium",
|
|
165
|
+
"note": "CSS injection via style.background (url() injection)"
|
|
166
|
+
},
|
|
167
|
+
{
|
|
168
|
+
"property": "backgroundImage",
|
|
169
|
+
"type": "css_injection",
|
|
170
|
+
"cwe": "CWE-79",
|
|
171
|
+
"severity": "medium",
|
|
172
|
+
"note": "CSS injection via style.backgroundImage (url() injection)"
|
|
159
173
|
}
|
|
160
174
|
],
|
|
161
175
|
"sanitizers": [
|
package/configs/sinks/rust.json
CHANGED
|
@@ -397,6 +397,49 @@
|
|
|
397
397
|
"severity": "high",
|
|
398
398
|
"tainted_args": [0],
|
|
399
399
|
"note": "Redirect to user-controlled URL"
|
|
400
|
+
},
|
|
401
|
+
{
|
|
402
|
+
"method": "Html",
|
|
403
|
+
"type": "xss",
|
|
404
|
+
"cwe": "CWE-79",
|
|
405
|
+
"severity": "high",
|
|
406
|
+
"tainted_args": [0],
|
|
407
|
+
"note": "axum::response::Html() with user-controlled content"
|
|
408
|
+
},
|
|
409
|
+
{
|
|
410
|
+
"method": "from_str",
|
|
411
|
+
"class": "HeaderValue",
|
|
412
|
+
"type": "open_redirect",
|
|
413
|
+
"cwe": "CWE-601",
|
|
414
|
+
"severity": "high",
|
|
415
|
+
"tainted_args": [0],
|
|
416
|
+
"note": "HeaderValue::from_str() for Location header with user input"
|
|
417
|
+
}
|
|
418
|
+
],
|
|
419
|
+
"sanitizers": [
|
|
420
|
+
{
|
|
421
|
+
"method": "encode_text",
|
|
422
|
+
"class": "html_escape",
|
|
423
|
+
"removes": ["xss"],
|
|
424
|
+
"note": "html_escape::encode_text() HTML entity encoding"
|
|
425
|
+
},
|
|
426
|
+
{
|
|
427
|
+
"method": "encode_quoted_attribute",
|
|
428
|
+
"class": "html_escape",
|
|
429
|
+
"removes": ["xss"],
|
|
430
|
+
"note": "html_escape::encode_quoted_attribute()"
|
|
431
|
+
},
|
|
432
|
+
{
|
|
433
|
+
"method": "clean",
|
|
434
|
+
"class": "ammonia",
|
|
435
|
+
"removes": ["xss"],
|
|
436
|
+
"note": "ammonia::clean() HTML sanitizer"
|
|
437
|
+
},
|
|
438
|
+
{
|
|
439
|
+
"method": "clean",
|
|
440
|
+
"class": "Builder",
|
|
441
|
+
"removes": ["xss"],
|
|
442
|
+
"note": "ammonia::Builder::clean() HTML sanitizer"
|
|
400
443
|
}
|
|
401
444
|
]
|
|
402
445
|
}
|
package/configs/sinks/xss.yaml
CHANGED
|
@@ -744,6 +744,38 @@
|
|
|
744
744
|
],
|
|
745
745
|
"note": "Google Guava HtmlEscapers.htmlEscaper()"
|
|
746
746
|
},
|
|
747
|
+
{
|
|
748
|
+
"method": "encodeForHTML",
|
|
749
|
+
"class": "Encoder",
|
|
750
|
+
"removes": [
|
|
751
|
+
"xss"
|
|
752
|
+
],
|
|
753
|
+
"note": "OWASP ESAPI Encoder.encodeForHTML()"
|
|
754
|
+
},
|
|
755
|
+
{
|
|
756
|
+
"method": "encodeForHTMLAttribute",
|
|
757
|
+
"class": "Encoder",
|
|
758
|
+
"removes": [
|
|
759
|
+
"xss"
|
|
760
|
+
],
|
|
761
|
+
"note": "OWASP ESAPI Encoder.encodeForHTMLAttribute()"
|
|
762
|
+
},
|
|
763
|
+
{
|
|
764
|
+
"method": "encodeForJavaScript",
|
|
765
|
+
"class": "Encoder",
|
|
766
|
+
"removes": [
|
|
767
|
+
"xss"
|
|
768
|
+
],
|
|
769
|
+
"note": "OWASP ESAPI Encoder.encodeForJavaScript()"
|
|
770
|
+
},
|
|
771
|
+
{
|
|
772
|
+
"method": "clean",
|
|
773
|
+
"class": "Jsoup",
|
|
774
|
+
"removes": [
|
|
775
|
+
"xss"
|
|
776
|
+
],
|
|
777
|
+
"note": "Jsoup.clean() HTML sanitizer"
|
|
778
|
+
},
|
|
747
779
|
{
|
|
748
780
|
"tag": "c:out",
|
|
749
781
|
"removes": [
|
|
@@ -292,6 +292,22 @@
|
|
|
292
292
|
"return_tainted": true,
|
|
293
293
|
"note": "Event target value"
|
|
294
294
|
},
|
|
295
|
+
{
|
|
296
|
+
"method": "getItem",
|
|
297
|
+
"object": "localStorage",
|
|
298
|
+
"type": "storage_input",
|
|
299
|
+
"severity": "medium",
|
|
300
|
+
"return_tainted": true,
|
|
301
|
+
"note": "localStorage.getItem() - data may have been set by attacker via XSS"
|
|
302
|
+
},
|
|
303
|
+
{
|
|
304
|
+
"method": "getItem",
|
|
305
|
+
"object": "sessionStorage",
|
|
306
|
+
"type": "storage_input",
|
|
307
|
+
"severity": "medium",
|
|
308
|
+
"return_tainted": true,
|
|
309
|
+
"note": "sessionStorage.getItem() - data may have been set by attacker via XSS"
|
|
310
|
+
},
|
|
295
311
|
{
|
|
296
312
|
"property": "referrer",
|
|
297
313
|
"object": "document",
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "circle-ir",
|
|
3
|
-
"version": "3.18.
|
|
3
|
+
"version": "3.18.2",
|
|
4
4
|
"description": "High-performance Static Application Security Testing (SAST) library for detecting security vulnerabilities through taint analysis",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"module": "dist/index.js",
|