Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VRT-release-changes #415

Merged
merged 5 commits into from
Jul 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 22 additions & 6 deletions mappings/cvss_v3/cvss_v3.json
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,18 @@
"id": "unsafe_cross_origin_resource_sharing",
"cvss_v3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"
},
{
"id": "software_package_takeover",
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"id": "email_verification_bypass",
"cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"
},
{
"id": "missing_subresource_integrity",
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N"
},
{
"id": "request_smuggling",
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
Expand Down Expand Up @@ -362,10 +374,6 @@
"id": "two_fa_bypass",
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
{
"id": "privilege_escalation",
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N"
},
{
"id": "cleartext_transmission_of_session_token",
"cvss_v3": "AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
Expand Down Expand Up @@ -581,7 +589,11 @@
{
"id": "over_http",
"cvss_v3": "AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"
}
},
{
"id": "password_reset_token",
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
]
},
{
Expand Down Expand Up @@ -715,7 +727,11 @@
{
"id": "username_enumeration",
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
},
{
"id": "privilege_escalation",
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N"
}
]
},
{
Expand Down
8 changes: 4 additions & 4 deletions mappings/cwe/cwe.json
Original file line number Diff line number Diff line change
Expand Up @@ -204,10 +204,6 @@
"id": "two_fa_bypass",
"cwe": ["CWE-304"]
},
{
"id": "privilege_escalation",
"cwe": ["CWE-269"]
},
{
"id": "cleartext_transmission_of_session_token",
"cwe": ["CWE-319"]
Expand Down Expand Up @@ -306,6 +302,10 @@
"id": "exposed_sensitive_android_intent",
"cwe": ["CWE-927"]
},
{
"id": "privilege_escalation",
"cwe": ["CWE-269"]
},
{
"id": "exposed_sensitive_ios_url_scheme",
"cwe": ["CWE-939"]
Expand Down
32 changes: 32 additions & 0 deletions mappings/remediation_advice/remediation_advice.json
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,30 @@
"https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS"
]
},
{
"id": "email_verification_bypass",
"remediation_advice": "1. **Implement Robust Token Validation:** Ensure that any token used for email verification is securely generated and validated. Tokens should be long, random, and use secure hashing algorithms to prevent guessing attacks.\n2. **Secure Transmission:** Use HTTPS to protect the transmission of tokens over the network. Ensure that the tokens are not leaked via URLs in the `Referer` header by instructing users to avoid clicking on links from untrusted sources or by implementing measures to strip sensitive information from URLs.\n3. **Expire Tokens Quickly:** Set a short expiration time for verification tokens to limit the window of opportunity for an attacker. Once a token is used or expires, it should be invalidated immediately to prevent reuse.",
"references": [
"https://owasp.org/www-community/attacks/Email_Injection",
"https://portswigger.net/web-security/email-security"
]
},
{
"id": "missing_subresource_integrity",
"remediation_advice": "1. **Implement SRI:** Add an `integrity` attribute with a base64-encoded hash to `<script>` and `<link>` tags for external resources. \n2. **Validate Hashes:** Always check the hashes of resources yourself before implementation to ensure they haven't been altered. \n3. **Update Hashes Regularly:** Monitor and update the hashes to reflect changes in the external libraries or resources you use.",
"references": [
"https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity",
"https://www.w3.org/TR/SRI/"
]
},
{
"id": "software_package_takeover",
"remediation_advice": "1. **Monitor Dependencies:** Regularly review and update the dependencies in your software projects to ensure they are secure and maintained. Use tools that can automatically check for outdated or vulnerable packages. \n2. **Secure Access Rights:** Restrict and monitor access to package management systems and repositories to prevent unauthorized changes. Use two-factor authentication and strong access controls. \n3. **Verify Package Integrity:** Before deployment, verify the integrity and authenticity of packages using signatures or other verification methods.",
"references": [
"https://owasp.org/www-community/attacks/Subdomain_Takeover",
"https://snyk.io/blog/ten-git-hub-security-best-practices/"
]
},
{
"id": "request_smuggling",
"remediation_advice": "Implement a robust security configuration, including secure parsing and handling of HTTP requests, and consider deploying a Web Application Firewall (WAF) to detect and mitigate potential smuggling attacks.",
Expand Down Expand Up @@ -932,6 +956,14 @@
"https://www.owasp.org/index.php/Mobile_Top_10_2016-M1-Improper_Platform_Usage"
]
},
{
"id": "privilege_escalation",
"remediation_advice": "1. **Least Privilege Principle:** Enforce the least privilege principle by ensuring that users and processes operate using the minimum permissions necessary to perform their tasks. \n2. **Regular Audits:** Conduct regular audits of system permissions and user roles to identify and rectify excessive permissions or misconfigurations. \n3. **Patch Management:** Keep all systems, applications, and services up to date with the latest security patches to close vulnerabilities that could be exploited for privilege escalation.",
"references": [
"https://owasp.org/www-community/attacks/Privilege_escalation",
"https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/least-privilege"
]
},
{
"id": "exposed_sensitive_ios_url_scheme",
"remediation_advice": "Apple does not enforce the unique naming for App schemes, making it possible for a malicious app to use the same URL Scheme as a legitimate app, effectively hijacking the URL Scheme. As a result, it is important to keep the URL Scheme from being exposed.",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -88,6 +88,9 @@
"server_security_misconfiguration.waf_bypass": null,
"server_security_misconfiguration.waf_bypass.direct_server_access": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:waf_bypass:direct_server_access&redirect=true",
"server_security_misconfiguration.race_condition": null,
"server_security_misconfiguration.email_verification_bypass": null,
"server_security_misconfiguration.missing_subresource_integrity": null,
"server_security_misconfiguration.software_package_takeover": null,
"server_security_misconfiguration.cache_poisoning": null,
"server_security_misconfiguration.bitsquatting": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:bitsquatting&redirect=true",
"server_side_injection": null,
Expand Down Expand Up @@ -118,7 +121,6 @@
"broken_authentication_and_session_management": null,
"broken_authentication_and_session_management.authentication_bypass": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:authentication_bypass&redirect=true",
"broken_authentication_and_session_management.two_fa_bypass": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:two_fa_bypass&redirect=true",
"broken_authentication_and_session_management.privilege_escalation": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:privilege_escalation&redirect=true",
"broken_authentication_and_session_management.cleartext_transmission_of_session_token": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:cleartext_transmission_of_session_token&redirect=true",
"broken_authentication_and_session_management.weak_login_function": null,
"broken_authentication_and_session_management.weak_login_function.not_operational": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:weak_login_function:not_operational&redirect=true",
Expand Down Expand Up @@ -160,6 +162,7 @@
"sensitive_data_exposure.token_leakage_via_referer.trusted_third_party": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:token_leakage_via_referer:trusted_third_party&redirect=true",
"sensitive_data_exposure.token_leakage_via_referer.untrusted_third_party": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:token_leakage_via_referer:untrusted_third_party&redirect=true",
"sensitive_data_exposure.token_leakage_via_referer.over_http": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:token_leakage_via_referer:over_http&redirect=true",
"sensitive_data_exposure.token_leakage_via_referer.password_reset_token": null,
"sensitive_data_exposure.sensitive_token_in_url": null,
"sensitive_data_exposure.sensitive_token_in_url.user_facing": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:sensitive_token_in_url:user_facing&redirect=true",
"sensitive_data_exposure.sensitive_token_in_url.in_the_background": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:sensitive_token_in_url:in_the_background&redirect=true",
Expand Down Expand Up @@ -206,6 +209,7 @@
"broken_access_control.username_enumeration": null,
"broken_access_control.username_enumeration.non_brute_force": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_access_control:username_enumeration:non_brute_force&redirect=true",
"broken_access_control.exposed_sensitive_android_intent": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_access_control:exposed_sensitive_android_intent&redirect=true",
"broken_access_control.privilege_escalation": null,
"broken_access_control.exposed_sensitive_ios_url_scheme": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_access_control:exposed_sensitive_ios_url_scheme&redirect=true",
"cross_site_request_forgery_csrf": null,
"cross_site_request_forgery_csrf.application_wide": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=cross_site_request_forgery_csrf:application_wide&redirect=true",
Expand Down
38 changes: 31 additions & 7 deletions vulnerability-rating-taxonomy.json
Original file line number Diff line number Diff line change
Expand Up @@ -554,6 +554,24 @@
"type": "subcategory",
"priority": null
},
{
"id": "email_verification_bypass",
"name": "Email Verification Bypass",
"type": "subcategory",
"priority": 5
},
{
"id": "missing_subresource_integrity",
"name": "Missing Subresource Integrity",
"type": "subcategory",
"priority": 5
},
{
"id": "software_package_takeover",
"name": "Software Package Takeover",
"type": "subcategory",
"priority": null
},
{
"id": "cache_poisoning",
"name": "Cache Poisoning",
Expand Down Expand Up @@ -741,12 +759,6 @@
"type": "subcategory",
"priority": 3
},
{
"id": "privilege_escalation",
"name": "Privilege Escalation",
"type": "subcategory",
"priority": null
},
{
"id": "cleartext_transmission_of_session_token",
"name": "Cleartext Transmission of Session Token",
Expand Down Expand Up @@ -999,7 +1011,13 @@
"name": "Over HTTP",
"type": "variant",
"priority": 4
}
},
{
"id": "password_reset_token",
"name": "Password Reset Token",
"type": "subcategory",
"priority": 5
}
]
},
{
Expand Down Expand Up @@ -1289,6 +1307,12 @@
"type": "subcategory",
"priority": null
},
{
"id": "privilege_escalation",
"name": "Privilege Escalation",
"type": "subcategory",
"priority": null
},
{
"id": "exposed_sensitive_ios_url_scheme",
"name": "Exposed Sensitive iOS URL Scheme",
Expand Down
Loading