diff --git a/mappings/cvss_v3/cvss_v3.json b/mappings/cvss_v3/cvss_v3.json index 665df020..e2fbf17e 100644 --- a/mappings/cvss_v3/cvss_v3.json +++ b/mappings/cvss_v3/cvss_v3.json @@ -846,173 +846,173 @@ ] }, { - "id": "cryptographic_weakness", - "children": [ + "id": "cryptographic_weakness", + "children": [ { - "id": "insufficient_entropy", - "children": [ + "id": "insufficient_entropy", + "children": [ { - "id": "limited_rng_entropy_source", - "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" + "id": "limited_rng_entropy_source", + "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" }, - { - "id": "use_of_trng_for_nonsecurity_purpose", - "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" - }, - { - "id": "prng_seed_reuse", - "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" - }, - { - "id": "predictable_prng_seed", - "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" - }, - { - "id": "small_seed_space_in_prng", - "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" - }, - { - "id": "initialization_vector_reuse", - "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" - }, - { - "id": "predictable_initialization_vector", - "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" - } - ] + { + "id": "use_of_trng_for_nonsecurity_purpose", + "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, + { + "id": "prng_seed_reuse", + "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" + }, + { + "id": "predictable_prng_seed", + "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" + }, + { + "id": "small_seed_space_in_prng", + "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" + }, + { + "id": "initialization_vector_reuse", + "cvss_v3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" + }, + { + "id": "predictable_initialization_vector", + "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ] }, { - "id": "insecure_implementation", - "children": [ + "id": "insecure_implementation", + "children": [ { - "id": "missing_cryptographic_step", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" + "id": "missing_cryptographic_step", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" }, { - "id": "improper_following_of_specification", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" + "id": "improper_following_of_specification", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" } - ] + ] }, { - "id": "weak_hash", - "children": [ + "id": "weak_hash", + "children": [ { - "id": "lack_of_salt", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" + "id": "lack_of_salt", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" }, { - "id": "use_of_predictable_salt", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" + "id": "use_of_predictable_salt", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" }, { - "id": "predictable_hash_collision", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" + "id": "predictable_hash_collision", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" } - ] + ] }, { - "id": "insufficient_verification_of_data_authenticity", - "children": [ + "id": "insufficient_verification_of_data_authenticity", + "children": [ { - "id": "identity_check_value", - "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" + "id": "identity_check_value", + "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { - "id": "cryptographic_signature", - "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" + "id": "cryptographic_signature", + "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } - ] + ] }, { - "id": "insecure_key_generation", - "children": [ + "id": "insecure_key_generation", + "children": [ { - "id": "improper_asymmetric_prime_selection", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" + "id": "improper_asymmetric_prime_selection", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { - "id": "improper_asymmetric_exponent_selection", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" + "id": "improper_asymmetric_exponent_selection", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { - "id": "insufficient_key_stretching", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" + "id": "insufficient_key_stretching", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, - { - "id": "insufficient_key_space", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" - }, { - "id": "key_exchange_without_entity_authentication", - "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" + "id": "insufficient_key_space", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" + }, + { + "id": "key_exchange_without_entity_authentication", + "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } - ] + ] }, { - "id": "key_reuse", - "children": [ + "id": "key_reuse", + "children": [ { - "id": "lack_of_perfect_forward_secrecy", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" - }, - { - "id": "intra-environment", - "cvss_v3": "AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" - }, - { - "id": "inter-environment", - "cvss_v3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" - } - ] + "id": "lack_of_perfect_forward_secrecy", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" + }, + { + "id": "intra-environment", + "cvss_v3": "AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" + }, + { + "id": "inter-environment", + "cvss_v3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ] }, { - "id": "side-channel_attack", - "children": [ + "id": "side-channel_attack", + "children": [ { - "id": "padding_oracle_attack", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + "id": "padding_oracle_attack", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { - "id": "timing_attack", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + "id": "timing_attack", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { - "id": "power_analysis_attack", - "cvss_v3": "AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + "id": "power_analysis_attack", + "cvss_v3": "AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { - "id": "emanations_attack", - "cvss_v3": "AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + "id": "emanations_attack", + "cvss_v3": "AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { - "id": "differential_fault_analysis", - "cvss_v3": "AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + "id": "differential_fault_analysis", + "cvss_v3": "AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } - ] + ] }, { - "id": "use_of_expired_cryptographic_key_or_cert", - "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" + "id": "use_of_expired_cryptographic_key_or_cert", + "cvss_v3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { - "id": "incomplete_cleanup_of_keying_material", - "cvss_v3": "AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" + "id": "incomplete_cleanup_of_keying_material", + "cvss_v3": "AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" } - ] + ] }, { - "id": "broken_cryptography", - "children": [ + "id": "broken_cryptography", + "children": [ { - "id": "use_of_broken_cryptographic_primitive", - "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" + "id": "use_of_broken_cryptographic_primitive", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { - "id": "use_of_vulnerable_cryptographic_library", - "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" + "id": "use_of_vulnerable_cryptographic_library", + "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } - ] + ] }, { "id": "privacy_concerns", diff --git a/mappings/cwe/cwe.json b/mappings/cwe/cwe.json index d1f19a54..c12671e2 100644 --- a/mappings/cwe/cwe.json +++ b/mappings/cwe/cwe.json @@ -147,7 +147,7 @@ "id": "server_side_injection", "cwe": ["CWE-929"], "children": [ - { + { "id": "ldap_injection", "cwe": ["CWE-90"] }, @@ -239,54 +239,53 @@ } ] }, -{ - "id": "sensitive_data_exposure", - "cwe": ["CWE-934"], - "children": [ { - "id": "disclosure_of_secrets", + "id": "sensitive_data_exposure", + "cwe": ["CWE-934"], "children": [ { - "id": "pii_leakage_exposure", + "id": "disclosure_of_secrets", + "children": [ + { + "id": "pii_leakage_exposure", + "cwe": ["CWE-200"] + } + ] + }, + { + "id": "exif_geolocation_data_not_stripped_from_uploaded_images", + "cwe": ["CWE-200"] + }, + { + "id": "visible_detailed_error_page", + "cwe": ["CWE-209", "CWE-215"] + }, + { + "id": "disclosure_of_known_public_information", "cwe": ["CWE-200"] + }, + { + "id": "token_leakage_via_referer", + "cwe": ["CWE-200"] + }, + { + "id": "sensitive_token_in_url", + "cwe": ["CWE-200"] + }, + { + "id": "non_sensitive_token_in_url", + "cwe": ["CWE-200"] + }, + { + "id": "weak_password_reset_implementation", + "cwe": ["CWE-640"] + }, + { + "id": "via_localstorage_sessionstorage", + "cwe": ["CWE-922"] } ] }, - { - "id": "exif_geolocation_data_not_stripped_from_uploaded_images", - "cwe": ["CWE-200"] - }, - { - "id": "visible_detailed_error_page", - "cwe": ["CWE-209", "CWE-215"] - }, - { - "id": "disclosure_of_known_public_information", - "cwe": ["CWE-200"] - }, - { - "id": "token_leakage_via_referer", - "cwe": ["CWE-200"] - }, - { - "id": "sensitive_token_in_url", - "cwe": ["CWE-200"] - }, - { - "id": "non_sensitive_token_in_url", - "cwe": ["CWE-200"] - }, - { - "id": "weak_password_reset_implementation", - "cwe": ["CWE-640"] - }, - { - "id": "via_localstorage_sessionstorage", - "cwe": ["CWE-922"] - } - ] -} -, { "id": "cross_site_scripting_xss", "cwe": ["CWE-79"] @@ -425,182 +424,183 @@ } ] }, - { "id": "cryptographic_weakness", - "cwe": ["CWE-310","CWE-1205"], - "children": [ + { + "id": "cryptographic_weakness", + "cwe": ["CWE-310", "CWE-1205"], + "children": [ { - "id": "insufficient_entropy", - "cwe": ["CWE-330","CWE-331"], - "children": [ + "id": "insufficient_entropy", + "cwe": ["CWE-330", "CWE-331"], + "children": [ { - "id": "limited_rng_entropy_source", - "cwe": ["CWE-338","CWE-332"] + "id": "limited_rng_entropy_source", + "cwe": ["CWE-338", "CWE-332"] }, - { - "id": "use_of_trng_for_nonsecurity_purpose", - "cwe": ["CWE-333"] - }, - { - "id": "prng_seed_reuse", - "cwe": ["CWE-336"] - }, - { - "id": "predictable_prng_seed", - "cwe": ["CWE-337"] - }, - { - "id": "small_seed_space_in_prng", - "cwe": ["CWE-339","CWE-334"] - }, - { - "id": "initialization_vector_reuse", - "cwe": ["CWE-1204"] - }, - { - "id": "predictable_initialization_vector", - "cwe": ["CWE-340"] - } - ] + { + "id": "use_of_trng_for_nonsecurity_purpose", + "cwe": ["CWE-333"] + }, + { + "id": "prng_seed_reuse", + "cwe": ["CWE-336"] + }, + { + "id": "predictable_prng_seed", + "cwe": ["CWE-337"] + }, + { + "id": "small_seed_space_in_prng", + "cwe": ["CWE-339", "CWE-334"] + }, + { + "id": "initialization_vector_reuse", + "cwe": ["CWE-1204"] + }, + { + "id": "predictable_initialization_vector", + "cwe": ["CWE-340"] + } + ] }, { - "id": "insecure_implementation", - "cwe": ["CWE-573"], - "children": [ + "id": "insecure_implementation", + "cwe": ["CWE-573"], + "children": [ { - "id": "missing_cryptographic_step", - "cwe": ["CWE-325"] + "id": "missing_cryptographic_step", + "cwe": ["CWE-325"] }, { - "id": "improper_following_of_specification", - "cwe": ["CWE-358","CWE-573"] + "id": "improper_following_of_specification", + "cwe": ["CWE-358", "CWE-573"] } - ] + ] }, { - "id": "weak_hash", - "cwe": ["CWE-328"], - "children": [ + "id": "weak_hash", + "cwe": ["CWE-328"], + "children": [ { - "id": "lack_of_salt", - "cwe": ["CWE-759","CWE-916"] + "id": "lack_of_salt", + "cwe": ["CWE-759", "CWE-916"] }, { - "id": "use_of_predictable_salt", - "cwe": ["CWE-760"] + "id": "use_of_predictable_salt", + "cwe": ["CWE-760"] }, { - "id": "predictable_hash_collision", - "cwe": ["CWE-328"] + "id": "predictable_hash_collision", + "cwe": ["CWE-328"] } - ] + ] }, { - "id": "insufficient_verification_of_data_authenticity", - "cwe": ["CWE-345"], - "children": [ + "id": "insufficient_verification_of_data_authenticity", + "cwe": ["CWE-345"], + "children": [ { - "id": "identity_check_value", - "cwe": ["CWE-353","CWE-354","CWE-924"] + "id": "identity_check_value", + "cwe": ["CWE-353", "CWE-354", "CWE-924"] }, { - "id": "cryptographic_signature", - "cwe": ["CWE-347"] + "id": "cryptographic_signature", + "cwe": ["CWE-347"] } - ] + ] }, { - "id": "insecure_key_generation", - "cwe": null, - "children": [ + "id": "insecure_key_generation", + "cwe": null, + "children": [ { - "id": "improper_asymmetric_prime_selection", - "cwe": ["CWE-326","CWE-1240"] + "id": "improper_asymmetric_prime_selection", + "cwe": ["CWE-326", "CWE-1240"] }, { - "id": "improper_asymmetric_exponent_selection", - "cwe": ["CWE-326","CWE-1240"] + "id": "improper_asymmetric_exponent_selection", + "cwe": ["CWE-326", "CWE-1240"] }, { - "id": "insufficient_key_stretching", - "cwe": ["CWE-326","CWE-1240"] + "id": "insufficient_key_stretching", + "cwe": ["CWE-326", "CWE-1240"] + }, + { + "id": "insufficient_key_space", + "cwe": ["CWE-326", "CWE-331", "CWE-1240"] }, - { - "id": "insufficient_key_space", - "cwe": ["CWE-326","CWE-331","CWE-1240"] - }, { - "id": "key_exchange_without_entity_authentication", - "cwe": ["CWE-322"] + "id": "key_exchange_without_entity_authentication", + "cwe": ["CWE-322"] } - ] + ] }, { - "id": "key_reuse", - "cwe": ["CWE-323"], - "children": [ + "id": "key_reuse", + "cwe": ["CWE-323"], + "children": [ { - "id": "lack_of_perfect_forward_secrecy", - "cwe": ["CWE-323"] - }, - { - "id": "intra-environment", - "cwe": ["CWE-323"] - }, - { - "id": "inter-environment", - "cwe": ["CWE-323"] - } - ] + "id": "lack_of_perfect_forward_secrecy", + "cwe": ["CWE-323"] + }, + { + "id": "intra-environment", + "cwe": ["CWE-323"] + }, + { + "id": "inter-environment", + "cwe": ["CWE-323"] + } + ] }, { - "id": "side-channel_attack", - "cwe": ["CWE-203","CWE-1300"], - "children": [ + "id": "side-channel_attack", + "cwe": ["CWE-203", "CWE-1300"], + "children": [ { - "id": "padding_oracle_attack", - "cwe": ["CWE-780"] + "id": "padding_oracle_attack", + "cwe": ["CWE-780"] }, { - "id": "timing_attack", - "cwe": ["CWE-208"] + "id": "timing_attack", + "cwe": ["CWE-208"] }, { - "id": "power_analysis_attack", - "cwe": ["CWE-1300"] + "id": "power_analysis_attack", + "cwe": ["CWE-1300"] }, { - "id": "emanations_attack", - "cwe": ["CWE-1300"] + "id": "emanations_attack", + "cwe": ["CWE-1300"] }, { - "id": "differential_fault_analysis", - "cwe": ["CWE-204","CWE-205"] + "id": "differential_fault_analysis", + "cwe": ["CWE-204", "CWE-205"] } - ] + ] }, { - "id": "use_of_expired_cryptographic_key_or_cert", - "cwe": ["CWE-295","CWE-298","CWE-299","CWE-324"] + "id": "use_of_expired_cryptographic_key_or_cert", + "cwe": ["CWE-295", "CWE-298", "CWE-299", "CWE-324"] }, { - "id": "incomplete_cleanup_of_keying_material", - "cwe": ["CWE-459"] + "id": "incomplete_cleanup_of_keying_material", + "cwe": ["CWE-459"] } - ] + ] }, { - "id": "broken_cryptography", - "cwe": ["CWE-327"], - "children": [ + "id": "broken_cryptography", + "cwe": ["CWE-327"], + "children": [ { - "id": "use_of_broken_cryptographic_primitive", - "cwe": ["CWE-327"] + "id": "use_of_broken_cryptographic_primitive", + "cwe": ["CWE-327"] }, { - "id": "use_of_vulnerable_cryptographic_library", - "cwe": ["CWE-327"] + "id": "use_of_vulnerable_cryptographic_library", + "cwe": ["CWE-327"] } - ] + ] }, { "id": "privacy_concerns", diff --git a/mappings/remediation_advice/remediation_advice.json b/mappings/remediation_advice/remediation_advice.json index 42f2abd6..cde35058 100644 --- a/mappings/remediation_advice/remediation_advice.json +++ b/mappings/remediation_advice/remediation_advice.json @@ -56,9 +56,7 @@ { "id": "same_site_scripting", "remediation_advice": "As a best practice, do not resolve targets or hostnames to 127.0.0.1 or similar addresses.", - "references": [ - "http://seclists.org/bugtraq/2008/Jan/270" - ] + "references": ["http://seclists.org/bugtraq/2008/Jan/270"] }, { "id": "ssl_attack_breach_poodle_etc", @@ -106,9 +104,7 @@ { "id": "missing_caa_record", "remediation_advice": "As the domain name holder you can modify the DNS zone file to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain.", - "references": [ - "https://tools.ietf.org/html/rfc6844" - ] + "references": ["https://tools.ietf.org/html/rfc6844"] } ] }, @@ -167,9 +163,7 @@ { "id": "excessively_privileged_user_dba", "remediation_advice": "Ensure that the current DBMS session user has the least amount of privilege necessary.", - "references": [ - "https://www.owasp.org/index.php/Least_privilege" - ] + "references": ["https://www.owasp.org/index.php/Least_privilege"] } ] }, @@ -247,9 +241,7 @@ { "id": "cookie_scoped_to_parent_domain", "remediation_advice": "If possible do not set the domain for the session cookie. If domain is not set, so by default, the cookie will be a host only cookie, meaning accessible explicitly to the domain from which it was set.", - "references": [ - "https://tools.ietf.org/html/rfc6265" - ] + "references": ["https://tools.ietf.org/html/rfc6265"] }, { "id": "missing_secure_or_httponly_cookie_flag", @@ -295,9 +287,7 @@ { "id": "account_takeover", "remediation_advice": "Ensure correct implementation of OAuth protocol in order to protect client secrets and tokens, and provide secure access controls.", - "references": [ - "https://tools.ietf.org/html/rfc6819" - ] + "references": ["https://tools.ietf.org/html/rfc6819"] }, { "id": "account_squatting", @@ -535,9 +525,7 @@ { "id": "bitsquatting", "remediation_advice": "As a best practice, consider registering any potential bitsquatting domain names.", - "references": [ - "http://dinaburg.org/bitsquatting.html" - ] + "references": ["http://dinaburg.org/bitsquatting.html"] } ] }, @@ -627,9 +615,7 @@ { "id": "external_authentication_injection", "remediation_advice": "Even if unsafe HTML tags like `