Skip to content

Commit 2553222

Browse files
VRT-release-changes (#415)
* VRT-release-changes * Update cvss_v3.json * Update cwe.json * Adding SCW --------- Co-authored-by: Abhinav Nain <[email protected]>
1 parent 206c4b0 commit 2553222

File tree

5 files changed

+94
-18
lines changed

5 files changed

+94
-18
lines changed

mappings/cvss_v3/cvss_v3.json

+22-6
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,18 @@
3131
"id": "unsafe_cross_origin_resource_sharing",
3232
"cvss_v3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"
3333
},
34+
{
35+
"id": "software_package_takeover",
36+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
37+
},
38+
{
39+
"id": "email_verification_bypass",
40+
"cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"
41+
},
42+
{
43+
"id": "missing_subresource_integrity",
44+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N"
45+
},
3446
{
3547
"id": "request_smuggling",
3648
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
@@ -362,10 +374,6 @@
362374
"id": "two_fa_bypass",
363375
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
364376
},
365-
{
366-
"id": "privilege_escalation",
367-
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N"
368-
},
369377
{
370378
"id": "cleartext_transmission_of_session_token",
371379
"cvss_v3": "AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
@@ -581,7 +589,11 @@
581589
{
582590
"id": "over_http",
583591
"cvss_v3": "AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"
584-
}
592+
},
593+
{
594+
"id": "password_reset_token",
595+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
596+
}
585597
]
586598
},
587599
{
@@ -715,7 +727,11 @@
715727
{
716728
"id": "username_enumeration",
717729
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
718-
}
730+
},
731+
{
732+
"id": "privilege_escalation",
733+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N"
734+
}
719735
]
720736
},
721737
{

mappings/cwe/cwe.json

+4-4
Original file line numberDiff line numberDiff line change
@@ -204,10 +204,6 @@
204204
"id": "two_fa_bypass",
205205
"cwe": ["CWE-304"]
206206
},
207-
{
208-
"id": "privilege_escalation",
209-
"cwe": ["CWE-269"]
210-
},
211207
{
212208
"id": "cleartext_transmission_of_session_token",
213209
"cwe": ["CWE-319"]
@@ -306,6 +302,10 @@
306302
"id": "exposed_sensitive_android_intent",
307303
"cwe": ["CWE-927"]
308304
},
305+
{
306+
"id": "privilege_escalation",
307+
"cwe": ["CWE-269"]
308+
},
309309
{
310310
"id": "exposed_sensitive_ios_url_scheme",
311311
"cwe": ["CWE-939"]

mappings/remediation_advice/remediation_advice.json

+32
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,30 @@
3333
"https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS"
3434
]
3535
},
36+
{
37+
"id": "email_verification_bypass",
38+
"remediation_advice": "1. **Implement Robust Token Validation:** Ensure that any token used for email verification is securely generated and validated. Tokens should be long, random, and use secure hashing algorithms to prevent guessing attacks.\n2. **Secure Transmission:** Use HTTPS to protect the transmission of tokens over the network. Ensure that the tokens are not leaked via URLs in the `Referer` header by instructing users to avoid clicking on links from untrusted sources or by implementing measures to strip sensitive information from URLs.\n3. **Expire Tokens Quickly:** Set a short expiration time for verification tokens to limit the window of opportunity for an attacker. Once a token is used or expires, it should be invalidated immediately to prevent reuse.",
39+
"references": [
40+
"https://owasp.org/www-community/attacks/Email_Injection",
41+
"https://portswigger.net/web-security/email-security"
42+
]
43+
},
44+
{
45+
"id": "missing_subresource_integrity",
46+
"remediation_advice": "1. **Implement SRI:** Add an `integrity` attribute with a base64-encoded hash to `<script>` and `<link>` tags for external resources. \n2. **Validate Hashes:** Always check the hashes of resources yourself before implementation to ensure they haven't been altered. \n3. **Update Hashes Regularly:** Monitor and update the hashes to reflect changes in the external libraries or resources you use.",
47+
"references": [
48+
"https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity",
49+
"https://www.w3.org/TR/SRI/"
50+
]
51+
},
52+
{
53+
"id": "software_package_takeover",
54+
"remediation_advice": "1. **Monitor Dependencies:** Regularly review and update the dependencies in your software projects to ensure they are secure and maintained. Use tools that can automatically check for outdated or vulnerable packages. \n2. **Secure Access Rights:** Restrict and monitor access to package management systems and repositories to prevent unauthorized changes. Use two-factor authentication and strong access controls. \n3. **Verify Package Integrity:** Before deployment, verify the integrity and authenticity of packages using signatures or other verification methods.",
55+
"references": [
56+
"https://owasp.org/www-community/attacks/Subdomain_Takeover",
57+
"https://snyk.io/blog/ten-git-hub-security-best-practices/"
58+
]
59+
},
3660
{
3761
"id": "request_smuggling",
3862
"remediation_advice": "Implement a robust security configuration, including secure parsing and handling of HTTP requests, and consider deploying a Web Application Firewall (WAF) to detect and mitigate potential smuggling attacks.",
@@ -932,6 +956,14 @@
932956
"https://www.owasp.org/index.php/Mobile_Top_10_2016-M1-Improper_Platform_Usage"
933957
]
934958
},
959+
{
960+
"id": "privilege_escalation",
961+
"remediation_advice": "1. **Least Privilege Principle:** Enforce the least privilege principle by ensuring that users and processes operate using the minimum permissions necessary to perform their tasks. \n2. **Regular Audits:** Conduct regular audits of system permissions and user roles to identify and rectify excessive permissions or misconfigurations. \n3. **Patch Management:** Keep all systems, applications, and services up to date with the latest security patches to close vulnerabilities that could be exploited for privilege escalation.",
962+
"references": [
963+
"https://owasp.org/www-community/attacks/Privilege_escalation",
964+
"https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/least-privilege"
965+
]
966+
},
935967
{
936968
"id": "exposed_sensitive_ios_url_scheme",
937969
"remediation_advice": "Apple does not enforce the unique naming for App schemes, making it possible for a malicious app to use the same URL Scheme as a legitimate app, effectively hijacking the URL Scheme. As a result, it is important to keep the URL Scheme from being exposed.",

third-party-mappings/remediation_training/secure-code-warrior-links.json

+5-1
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,9 @@
8888
"server_security_misconfiguration.waf_bypass": null,
8989
"server_security_misconfiguration.waf_bypass.direct_server_access": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:waf_bypass:direct_server_access&redirect=true",
9090
"server_security_misconfiguration.race_condition": null,
91+
"server_security_misconfiguration.email_verification_bypass": null,
92+
"server_security_misconfiguration.missing_subresource_integrity": null,
93+
"server_security_misconfiguration.software_package_takeover": null,
9194
"server_security_misconfiguration.cache_poisoning": null,
9295
"server_security_misconfiguration.bitsquatting": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:bitsquatting&redirect=true",
9396
"server_side_injection": null,
@@ -118,7 +121,6 @@
118121
"broken_authentication_and_session_management": null,
119122
"broken_authentication_and_session_management.authentication_bypass": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:authentication_bypass&redirect=true",
120123
"broken_authentication_and_session_management.two_fa_bypass": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:two_fa_bypass&redirect=true",
121-
"broken_authentication_and_session_management.privilege_escalation": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:privilege_escalation&redirect=true",
122124
"broken_authentication_and_session_management.cleartext_transmission_of_session_token": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:cleartext_transmission_of_session_token&redirect=true",
123125
"broken_authentication_and_session_management.weak_login_function": null,
124126
"broken_authentication_and_session_management.weak_login_function.not_operational": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_authentication_and_session_management:weak_login_function:not_operational&redirect=true",
@@ -160,6 +162,7 @@
160162
"sensitive_data_exposure.token_leakage_via_referer.trusted_third_party": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:token_leakage_via_referer:trusted_third_party&redirect=true",
161163
"sensitive_data_exposure.token_leakage_via_referer.untrusted_third_party": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:token_leakage_via_referer:untrusted_third_party&redirect=true",
162164
"sensitive_data_exposure.token_leakage_via_referer.over_http": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:token_leakage_via_referer:over_http&redirect=true",
165+
"sensitive_data_exposure.token_leakage_via_referer.password_reset_token": null,
163166
"sensitive_data_exposure.sensitive_token_in_url": null,
164167
"sensitive_data_exposure.sensitive_token_in_url.user_facing": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:sensitive_token_in_url:user_facing&redirect=true",
165168
"sensitive_data_exposure.sensitive_token_in_url.in_the_background": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=sensitive_data_exposure:sensitive_token_in_url:in_the_background&redirect=true",
@@ -206,6 +209,7 @@
206209
"broken_access_control.username_enumeration": null,
207210
"broken_access_control.username_enumeration.non_brute_force": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_access_control:username_enumeration:non_brute_force&redirect=true",
208211
"broken_access_control.exposed_sensitive_android_intent": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_access_control:exposed_sensitive_android_intent&redirect=true",
212+
"broken_access_control.privilege_escalation": null,
209213
"broken_access_control.exposed_sensitive_ios_url_scheme": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=broken_access_control:exposed_sensitive_ios_url_scheme&redirect=true",
210214
"cross_site_request_forgery_csrf": null,
211215
"cross_site_request_forgery_csrf.application_wide": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=cross_site_request_forgery_csrf:application_wide&redirect=true",

vulnerability-rating-taxonomy.json

+31-7
Original file line numberDiff line numberDiff line change
@@ -554,6 +554,24 @@
554554
"type": "subcategory",
555555
"priority": null
556556
},
557+
{
558+
"id": "email_verification_bypass",
559+
"name": "Email Verification Bypass",
560+
"type": "subcategory",
561+
"priority": 5
562+
},
563+
{
564+
"id": "missing_subresource_integrity",
565+
"name": "Missing Subresource Integrity",
566+
"type": "subcategory",
567+
"priority": 5
568+
},
569+
{
570+
"id": "software_package_takeover",
571+
"name": "Software Package Takeover",
572+
"type": "subcategory",
573+
"priority": null
574+
},
557575
{
558576
"id": "cache_poisoning",
559577
"name": "Cache Poisoning",
@@ -741,12 +759,6 @@
741759
"type": "subcategory",
742760
"priority": 3
743761
},
744-
{
745-
"id": "privilege_escalation",
746-
"name": "Privilege Escalation",
747-
"type": "subcategory",
748-
"priority": null
749-
},
750762
{
751763
"id": "cleartext_transmission_of_session_token",
752764
"name": "Cleartext Transmission of Session Token",
@@ -999,7 +1011,13 @@
9991011
"name": "Over HTTP",
10001012
"type": "variant",
10011013
"priority": 4
1002-
}
1014+
},
1015+
{
1016+
"id": "password_reset_token",
1017+
"name": "Password Reset Token",
1018+
"type": "subcategory",
1019+
"priority": 5
1020+
}
10031021
]
10041022
},
10051023
{
@@ -1289,6 +1307,12 @@
12891307
"type": "subcategory",
12901308
"priority": null
12911309
},
1310+
{
1311+
"id": "privilege_escalation",
1312+
"name": "Privilege Escalation",
1313+
"type": "subcategory",
1314+
"priority": null
1315+
},
12921316
{
12931317
"id": "exposed_sensitive_ios_url_scheme",
12941318
"name": "Exposed Sensitive iOS URL Scheme",

0 commit comments

Comments
 (0)