Modify rules: Add STIG AS&D 2023-06-08 mappings (#3914)

* Update JSON schema to include STIG ASD 2023-06-08 mapping

* Update rules to add STIG metadata mappings

---------

Co-authored-by: Loris Sierra <loris.sierra@sonarsource.com>
This commit is contained in:
Jamie Anderson 2024-05-06 07:56:31 +01:00 committed by GitHub
parent 9f471b6739
commit 9ee16daa47
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
321 changed files with 1372 additions and 361 deletions

View File

@ -218,6 +218,15 @@
"pattern": "^\\d+\\.\\d+\\.\\d+$" "pattern": "^\\d+\\.\\d+\\.\\d+$"
}, },
"uniqueItems": true "uniqueItems": true
},
"STIG ASD 2023-06-08": {
"type": "array",
"minItems": 0,
"items": {
"type": "string",
"pattern": "^V-\\d+$"
},
"uniqueItems": true
} }
} }
}, },

View File

@ -45,6 +45,9 @@
"ASVS 4.0": [ "ASVS 4.0": [
"14.1.2", "14.1.2",
"5.4.1" "5.4.1"
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -50,6 +50,7 @@ If this code is given the word ``noncompliant`` as an input, ``noncompli␀`` wi
* OWASP - https://owasp.org/www-project-top-ten/2017/A9_2017-Using_Components_with_Known_Vulnerabilities[Top 10 2017 Category A9 - Using Components with Known Vulnerabilities] * OWASP - https://owasp.org/www-project-top-ten/2017/A9_2017-Using_Components_with_Known_Vulnerabilities[Top 10 2017 Category A9 - Using Components with Known Vulnerabilities]
* CWE - https://cwe.mitre.org/data/definitions/120[CWE-120 - Buffer Copy without Checking Size of Input] ('Classic Buffer Overflow') * CWE - https://cwe.mitre.org/data/definitions/120[CWE-120 - Buffer Copy without Checking Size of Input] ('Classic Buffer Overflow')
* CWE - https://cwe.mitre.org/data/definitions/676[CWE-676 - Use of Potentially Dangerous Function] * CWE - https://cwe.mitre.org/data/definitions/676[CWE-676 - Use of Potentially Dangerous Function]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -41,6 +41,9 @@
], ],
"CERT": [ "CERT": [
"STR07-C." "STR07-C."
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -5,3 +5,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A9_2017-Using_Components_with_Known_Vulnerabilities[Top 10 2017 Category A9 - Using Components with Known Vulnerabilities] * OWASP - https://owasp.org/www-project-top-ten/2017/A9_2017-Using_Components_with_Known_Vulnerabilities[Top 10 2017 Category A9 - Using Components with Known Vulnerabilities]
* CWE - https://cwe.mitre.org/data/definitions/676[CWE-676 - Use of Potentially Dangerous Function] * CWE - https://cwe.mitre.org/data/definitions/676[CWE-676 - Use of Potentially Dangerous Function]
* CWE - https://cwe.mitre.org/data/definitions/119[CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer] * CWE - https://cwe.mitre.org/data/definitions/119[CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.

View File

@ -24,6 +24,11 @@
"ruleSpecification": "RSPEC-1913", "ruleSpecification": "RSPEC-1913",
"sqKey": "S1913", "sqKey": "S1913",
"scope": "Main", "scope": "Main",
"securityStandards": {
"STIG ASD 2023-06-08": [
"V-222612"
]
},
"defaultQualityProfiles": [ "defaultQualityProfiles": [
"Sonar way" "Sonar way"
], ],

View File

@ -45,6 +45,10 @@ void function() {
* {cpp} reference - https://en.cppreference.com/w/cpp/language/sizeof[`sizeof` operator] * {cpp} reference - https://en.cppreference.com/w/cpp/language/sizeof[`sizeof` operator]
=== Standards
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -4,4 +4,5 @@
* OWASP - https://www.owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure[Top 10 2017 Category A3 - Sensitive Data Exposure] * OWASP - https://www.owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure[Top 10 2017 Category A3 - Sensitive Data Exposure]
* CWE - https://cwe.mitre.org/data/definitions/759[CWE-759 - Use of a One-Way Hash without a Salt] * CWE - https://cwe.mitre.org/data/definitions/759[CWE-759 - Use of a One-Way Hash without a Salt]
* CWE - https://cwe.mitre.org/data/definitions/760[CWE-760 - Use of a One-Way Hash with a Predictable Salt] * CWE - https://cwe.mitre.org/data/definitions/760[CWE-760 - Use of a One-Way Hash with a Predictable Salt]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222542[Application Security and Development: V-222542] - The application must only store cryptographic representations of passwords.

View File

@ -43,6 +43,9 @@
], ],
"PCI DSS 4.0": [ "PCI DSS 4.0": [
"6.2.4" "6.2.4"
],
"STIG ASD 2023-06-08": [
"V-222542"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -4,3 +4,6 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection] * OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection]
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/78[CWE-78 - Improper Neutralization of Special Elements used in an OS Command] * CWE - https://cwe.mitre.org/data/definitions/78[CWE-78 - Improper Neutralization of Special Elements used in an OS Command]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222604[Application Security and Development: V-222604] - The application must protect from command injection.
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -49,6 +49,10 @@
"5.1.3", "5.1.3",
"5.1.4", "5.1.4",
"5.3.8" "5.3.8"
],
"STIG ASD 2023-06-08": [
"V-222604",
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -6,3 +6,5 @@
* https://www.ietf.org/rfc/rfc4515.txt[RFC 4515] - LDAP: String Representation of Search Filters * https://www.ietf.org/rfc/rfc4515.txt[RFC 4515] - LDAP: String Representation of Search Filters
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/90[CWE-90 - Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')] * CWE - https://cwe.mitre.org/data/definitions/90[CWE-90 - Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -27,6 +27,9 @@
"5.1.3", "5.1.3",
"5.1.4", "5.1.4",
"5.3.7" "5.3.7"
],
"STIG ASD 2023-06-08": [
"V-222609"
] ]
} }
} }

View File

@ -48,6 +48,9 @@
"5.1.3", "5.1.3",
"5.1.4", "5.1.4",
"5.3.7" "5.3.7"
],
"STIG ASD 2023-06-08": [
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -6,3 +6,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A5_2017-Broken_Access_Control[Top 10 2017 Category A5 - Broken Access Control] * OWASP - https://owasp.org/www-project-top-ten/2017/A5_2017-Broken_Access_Control[Top 10 2017 Category A5 - Broken Access Control]
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/22[CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')] * CWE - https://cwe.mitre.org/data/definitions/22[CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -50,6 +50,9 @@
"12.3.1", "12.3.1",
"5.1.3", "5.1.3",
"5.1.4" "5.1.4"
],
"STIG ASD 2023-06-08": [
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -4,3 +4,6 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection] * OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection]
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/643[CWE-643 - Improper Neutralization of Data within XPath Expressions] * CWE - https://cwe.mitre.org/data/definitions/643[CWE-643 - Improper Neutralization of Data within XPath Expressions]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222608[Application Security and Development: V-222608] - The application must not be vulnerable to XML-oriented attacks.
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -27,6 +27,10 @@
"5.1.3", "5.1.3",
"5.1.4", "5.1.4",
"5.3.10" "5.3.10"
],
"STIG ASD 2023-06-08": [
"V-222608",
"V-222609"
] ]
} }
} }

View File

@ -48,6 +48,10 @@
"5.1.3", "5.1.3",
"5.1.4", "5.1.4",
"5.3.10" "5.3.10"
],
"STIG ASD 2023-06-08": [
"V-222608",
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -52,6 +52,9 @@
"6.1.1", "6.1.1",
"6.1.2", "6.1.2",
"6.1.3" "6.1.3"
],
"STIG ASD 2023-06-08": [
"V-222576"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -6,3 +6,5 @@
* CWE - https://cwe.mitre.org/data/definitions/311[CWE-311 - Missing Encryption of Sensitive Data] * CWE - https://cwe.mitre.org/data/definitions/311[CWE-311 - Missing Encryption of Sensitive Data]
* CWE - https://cwe.mitre.org/data/definitions/315[CWE-315 - Cleartext Storage of Sensitive Information in a Cookie] * CWE - https://cwe.mitre.org/data/definitions/315[CWE-315 - Cleartext Storage of Sensitive Information in a Cookie]
* CWE - https://cwe.mitre.org/data/definitions/614[CWE-614 - Sensitive Cookie in HTTPS Session Without 'Secure' Attribute] * CWE - https://cwe.mitre.org/data/definitions/614[CWE-614 - Sensitive Cookie in HTTPS Session Without 'Secure' Attribute]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222576[Application Security and Development: V-222576] - The application must set the secure flag on session cookies.

View File

@ -18,6 +18,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"5.4.3" "5.4.3"
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
} }
} }

View File

@ -33,9 +33,13 @@ void compliant2() {
== Resources == Resources
=== Standards
* MISRA {cpp}:2008, 5-0-8 - An explicit integral or floating-point conversion shall not increase the size of the underlying type of a cvalue expression. * MISRA {cpp}:2008, 5-0-8 - An explicit integral or floating-point conversion shall not increase the size of the underlying type of a cvalue expression.
* CWE - https://cwe.mitre.org/data/definitions/190[CWE-190 - Integer Overflow or Wraparound] * CWE - https://cwe.mitre.org/data/definitions/190[CWE-190 - Integer Overflow or Wraparound]
* https://wiki.sei.cmu.edu/confluence/x/I9cxBQ[CERT, INT18-C.] - Evaluate integer expressions in a larger size before comparing or assigning to that size * https://wiki.sei.cmu.edu/confluence/x/I9cxBQ[CERT, INT18-C.] - Evaluate integer expressions in a larger size before comparing or assigning to that size
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -30,7 +30,10 @@ static void Method(float f) { }
== Resources == Resources
=== Standards
* CWE - https://cwe.mitre.org/data/definitions/190[CWE-190 - Integer Overflow or Wraparound] * CWE - https://cwe.mitre.org/data/definitions/190[CWE-190 - Integer Overflow or Wraparound]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -14,6 +14,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"5.4.3" "5.4.3"
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
} }
} }

View File

@ -62,9 +62,13 @@ public float compute2(float factor){
== Resources == Resources
=== Standards
* CWE - https://cwe.mitre.org/data/definitions/190[CWE-190 - Integer Overflow or Wraparound] * CWE - https://cwe.mitre.org/data/definitions/190[CWE-190 - Integer Overflow or Wraparound]
* https://wiki.sei.cmu.edu/confluence/x/AjdGBQ[CERT, NUM50-J.] - Convert integers to floating point for floating-point operations * https://wiki.sei.cmu.edu/confluence/x/AjdGBQ[CERT, NUM50-J.] - Convert integers to floating point for floating-point operations
* https://wiki.sei.cmu.edu/confluence/x/I9cxBQ[CERT, INT18-C.] - Evaluate integer expressions in a larger size before comparing or assigning to that size * https://wiki.sei.cmu.edu/confluence/x/I9cxBQ[CERT, INT18-C.] - Evaluate integer expressions in a larger size before comparing or assigning to that size
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -34,6 +34,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"5.4.3" "5.4.3"
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -32,6 +32,9 @@
"securityStandards": { "securityStandards": {
"CERT": [ "CERT": [
"MSC11-J." "MSC11-J."
],
"STIG ASD 2023-06-08": [
"V-222567"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -169,6 +169,11 @@ public class MyServlet extends HttpServlet {
* https://www.devinline.com/2013/08/how-to-make-thread-safe-servlet.html[Nikhil Ranjan: How to make thread safe servlet ?] * https://www.devinline.com/2013/08/how-to-make-thread-safe-servlet.html[Nikhil Ranjan: How to make thread safe servlet ?]
* https://objectcomputing.com/resources/publications/sett/april-2000-tips-for-creating-thread-safe-code-avoiding-race-conditions[Object Computing: Tips for creating thread-safe code] * https://objectcomputing.com/resources/publications/sett/april-2000-tips-for-creating-thread-safe-code-avoiding-race-conditions[Object Computing: Tips for creating thread-safe code]
=== Standards
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222567[Application Security and Development: V-222567] - The application must not be vulnerable to race conditions.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]
''' '''

View File

@ -16,8 +16,12 @@
"cwe" "cwe"
], ],
"extra": { "extra": {
"replacementRules": [], "replacementRules": [
"legacyKeys": []
],
"legacyKeys": [
]
}, },
"defaultSeverity": "Critical", "defaultSeverity": "Critical",
"ruleSpecification": "RSPEC-2254", "ruleSpecification": "RSPEC-2254",
@ -32,6 +36,9 @@
], ],
"OWASP Top 10 2021": [ "OWASP Top 10 2021": [
"A4" "A4"
],
"STIG ASD 2023-06-08": [
"V-222582"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -64,6 +64,7 @@ The compliant example instead uses the server's session ID to verify if the sess
* OWASP - https://owasp.org/Top10/A04_2021-Insecure_Design/[Top 10 2021 Category A4 - Insecure Design] * OWASP - https://owasp.org/Top10/A04_2021-Insecure_Design/[Top 10 2021 Category A4 - Insecure Design]
* OWASP - https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication[Top 10 2017 Category A2 - Broken Authentication] * OWASP - https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication[Top 10 2017 Category A2 - Broken Authentication]
* CWE - https://cwe.mitre.org/data/definitions/807[CWE-807 - Reliance on Untrusted Inputs in a Security Decision] * CWE - https://cwe.mitre.org/data/definitions/807[CWE-807 - Reliance on Untrusted Inputs in a Security Decision]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222582[Application Security and Development: V-222582] - The application must not re-use or recycle session IDs.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -12,6 +12,9 @@
], ],
"OWASP Top 10 2021": [ "OWASP Top 10 2021": [
"A3" "A3"
],
"STIG ASD 2023-06-08": [
"V-222608"
] ]
} }
} }

View File

@ -4,10 +4,14 @@ include::../rule-except-see.adoc[]
== Resources == Resources
=== Standards
* OWASP - https://owasp.org/Top10/A03_2021-Injection/[Top 10 2021 Category A3 - Injection] * OWASP - https://owasp.org/Top10/A03_2021-Injection/[Top 10 2021 Category A3 - Injection]
* OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection] * OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection]
* OWASP - https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)[Top 10 2017 Category A4 - XML External Entities (XXE)] * OWASP - https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)[Top 10 2017 Category A4 - XML External Entities (XXE)]
* CWE - https://cwe.mitre.org/data/definitions/91[CWE-91 - XML Injection (aka Blind XPath Injection)] * CWE - https://cwe.mitre.org/data/definitions/91[CWE-91 - XML Injection (aka Blind XPath Injection)]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222608[Application Security and Development: V-222608] - The application must not be vulnerable to XML-oriented attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -15,6 +15,9 @@
], ],
"OWASP Top 10 2021": [ "OWASP Top 10 2021": [
"A3" "A3"
],
"STIG ASD 2023-06-08": [
"V-222608"
] ]
} }
} }

View File

@ -4,11 +4,15 @@ include::../rule-except-see.adoc[]
== Resources == Resources
=== Standards
* OWASP - https://owasp.org/Top10/A03_2021-Injection/[Top 10 2021 Category A3 - Injection] * OWASP - https://owasp.org/Top10/A03_2021-Injection/[Top 10 2021 Category A3 - Injection]
* OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection] * OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection]
* OWASP - https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)[Top 10 2017 Category A4 - XML External Entities (XXE)] * OWASP - https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)[Top 10 2017 Category A4 - XML External Entities (XXE)]
* CWE - https://cwe.mitre.org/data/definitions/91[CWE-91 - XML Injection (aka Blind XPath Injection)] * CWE - https://cwe.mitre.org/data/definitions/91[CWE-91 - XML Injection (aka Blind XPath Injection)]
* https://wiki.sei.cmu.edu/confluence/x/7jdGBQ[CERT, IDS51-J.] - Properly encode or escape output * https://wiki.sei.cmu.edu/confluence/x/7jdGBQ[CERT, IDS51-J.] - Properly encode or escape output
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222608[Application Security and Development: V-222608] - The application must not be vulnerable to XML-oriented attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -7,6 +7,7 @@
"constantCost": "15min" "constantCost": "15min"
}, },
"tags": [ "tags": [
], ],
"extra": { "extra": {
"replacementRules": [ "replacementRules": [
@ -30,6 +31,9 @@
], ],
"OWASP Top 10 2021": [ "OWASP Top 10 2021": [
"A3" "A3"
],
"STIG ASD 2023-06-08": [
"V-222608"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -27,6 +27,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"4.3.3" "4.3.3"
],
"STIG ASD 2023-06-08": [
"V-222430"
] ]
} }
} }

View File

@ -64,6 +64,8 @@ umask(S_IRWXO); // Compliant: further created files or directories will not have
* CWE - https://cwe.mitre.org/data/definitions/732[CWE-732 - Incorrect Permission Assignment for Critical Resource] * CWE - https://cwe.mitre.org/data/definitions/732[CWE-732 - Incorrect Permission Assignment for Critical Resource]
* CWE - https://cwe.mitre.org/data/definitions/266[CWE-266 - Incorrect Privilege Assignment] * CWE - https://cwe.mitre.org/data/definitions/266[CWE-266 - Incorrect Privilege Assignment]
* https://wiki.sei.cmu.edu/confluence/display/c/FIO06-C.+Create+files+with+appropriate+access+permissions[CERT, FIO06-C.] - Create files with appropriate access permissions * https://wiki.sei.cmu.edu/confluence/display/c/FIO06-C.+Create+files+with+appropriate+access+permissions[CERT, FIO06-C.] - Create files with appropriate access permissions
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222430[Application Security and Development: V-222430] - The application must execute without excessive account permissions.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -5,19 +5,28 @@
], ],
"securityStandards": { "securityStandards": {
"CERT": [ "CERT": [
], ],
"CWE": [ "CWE": [
732 732
], ],
"OWASP": [ "OWASP": [
], ],
"OWASP Top 10 2021": [ "OWASP Top 10 2021": [
], ],
"PCI DSS 3.2": [ "PCI DSS 3.2": [
], ],
"PCI DSS 4.0": [ "PCI DSS 4.0": [
], ],
"ASVS 4.0": [ "ASVS 4.0": [
],
"STIG ASD 2023-06-08": [
"V-222430"
] ]
}, },
"quickfix": "unknown" "quickfix": "unknown"

View File

@ -45,6 +45,8 @@ RUN chmod +t resource
* https://docs.docker.com/engine/reference/builder/#copy[COPY] - Docker COPY command * https://docs.docker.com/engine/reference/builder/#copy[COPY] - Docker COPY command
* https://man.archlinux.org/man/core/man-pages/chmod.1p.en[chmod reference] - `chmod` command * https://man.archlinux.org/man/core/man-pages/chmod.1p.en[chmod reference] - `chmod` command
* https://man.archlinux.org/man/chown.1.en[chown reference] - `chown` command * https://man.archlinux.org/man/chown.1.en[chown reference] - `chown` command
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222430[Application Security and Development: V-222430] - The application must execute without excessive account permissions.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -27,6 +27,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"4.3.3" "4.3.3"
],
"STIG ASD 2023-06-08": [
"V-222430"
] ]
}, },
"quickfix": "unknown" "quickfix": "unknown"

View File

@ -72,6 +72,8 @@ On operating systems that implement POSIX standard. This will throw a ``++Unsupp
* CWE - https://cwe.mitre.org/data/definitions/266[CWE-266 - Incorrect Privilege Assignment] * CWE - https://cwe.mitre.org/data/definitions/266[CWE-266 - Incorrect Privilege Assignment]
* https://wiki.sei.cmu.edu/confluence/display/java/FIO01-J.+Create+files+with+appropriate+access+permissions[CERT, FIO01-J.] - Create files with appropriate access permissions * https://wiki.sei.cmu.edu/confluence/display/java/FIO01-J.+Create+files+with+appropriate+access+permissions[CERT, FIO01-J.] - Create files with appropriate access permissions
* https://wiki.sei.cmu.edu/confluence/display/c/FIO06-C.+Create+files+with+appropriate+access+permissions[CERT, FIO06-C.] - Create files with appropriate access permissions * https://wiki.sei.cmu.edu/confluence/display/c/FIO06-C.+Create+files+with+appropriate+access+permissions[CERT, FIO06-C.] - Create files with appropriate access permissions
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222430[Application Security and Development: V-222430] - The application must execute without excessive account permissions.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -47,6 +47,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"4.3.3" "4.3.3"
],
"STIG ASD 2023-06-08": [
"V-222430"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -6,3 +6,5 @@
* https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/09-Test_File_Permission[OWASP File Permission] * https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/09-Test_File_Permission[OWASP File Permission]
* CWE - https://cwe.mitre.org/data/definitions/732[CWE-732 - Incorrect Permission Assignment for Critical Resource] * CWE - https://cwe.mitre.org/data/definitions/732[CWE-732 - Incorrect Permission Assignment for Critical Resource]
* CWE - https://cwe.mitre.org/data/definitions/266[CWE-266 - Incorrect Privilege Assignment] * CWE - https://cwe.mitre.org/data/definitions/266[CWE-266 - Incorrect Privilege Assignment]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222430[Application Security and Development: V-222430] - The application must execute without excessive account permissions.

View File

@ -5,3 +5,7 @@
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/400[CWE-400 - Uncontrolled Resource Consumption] * CWE - https://cwe.mitre.org/data/definitions/400[CWE-400 - Uncontrolled Resource Consumption]
* CWE - https://cwe.mitre.org/data/definitions/1333[CWE-1333 - Inefficient Regular Expression Complexity] * CWE - https://cwe.mitre.org/data/definitions/1333[CWE-1333 - Inefficient Regular Expression Complexity]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222594[Application Security and Development: V-222594] - The application must restrict the ability to launch Denial of Service (DoS) attacks against itself or other information systems.
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222667[Application Security and Development: V-222667] - Protections against DoS attacks must be implemented.

View File

@ -50,6 +50,11 @@
"12.1.1", "12.1.1",
"5.1.3", "5.1.3",
"5.1.4" "5.1.4"
],
"STIG ASD 2023-06-08": [
"V-222594",
"V-222609",
"V-222667"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -4,3 +4,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure[Top 10 2017 Category A3 - Sensitive Data Exposure] * OWASP - https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure[Top 10 2017 Category A3 - Sensitive Data Exposure]
* https://cheatsheetseries.owasp.org/cheatsheets/Web_Service_Security_Cheat_Sheet.html#user-authentication[OWASP Web Service Security Cheat Sheet] * https://cheatsheetseries.owasp.org/cheatsheets/Web_Service_Security_Cheat_Sheet.html#user-authentication[OWASP Web Service Security Cheat Sheet]
* CWE - https://cwe.mitre.org/data/definitions/522[CWE-522 - Insufficiently Protected Credentials] * CWE - https://cwe.mitre.org/data/definitions/522[CWE-522 - Insufficiently Protected Credentials]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222533[Application Security and Development: V-222533] - The application must authenticate all network connected endpoint devices before establishing any connection.

View File

@ -12,10 +12,16 @@
"func": "Constant\/Issue", "func": "Constant\/Issue",
"constantCost": "2h" "constantCost": "2h"
}, },
"tags": [], "tags": [
],
"extra": { "extra": {
"replacementRules": [], "replacementRules": [
"legacyKeys": []
],
"legacyKeys": [
]
}, },
"defaultSeverity": "Critical", "defaultSeverity": "Critical",
"ruleSpecification": "RSPEC-2647", "ruleSpecification": "RSPEC-2647",
@ -39,8 +45,13 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"2.10.3" "2.10.3"
],
"STIG ASD 2023-06-08": [
"V-222533"
] ]
}, },
"defaultQualityProfiles": [], "defaultQualityProfiles": [
],
"quickfix": "unknown" "quickfix": "unknown"
} }

View File

@ -0,0 +1,4 @@
=== Standards
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222567[Application Security and Development: V-222567] - The application must not be vulnerable to race conditions.

View File

@ -40,6 +40,9 @@ interface MyInterface
* https://www.c-sharpcorner.com/UploadFile/1d42da/race-conditions-in-threading-C-Sharp/[Race Conditions in C#] * https://www.c-sharpcorner.com/UploadFile/1d42da/race-conditions-in-threading-C-Sharp/[Race Conditions in C#]
include::../common/resources/standards.adoc[]
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]
''' '''

View File

@ -22,6 +22,11 @@ public class MyClass {
---- ----
== Resources
include::../common/resources/standards.adoc[]
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]
''' '''

View File

@ -27,6 +27,11 @@
"ruleSpecification": "RSPEC-2696", "ruleSpecification": "RSPEC-2696",
"sqKey": "S2696", "sqKey": "S2696",
"scope": "Main", "scope": "Main",
"securityStandards": {
"STIG ASD 2023-06-08": [
"V-222567"
]
},
"defaultQualityProfiles": [ "defaultQualityProfiles": [
"Sonar way" "Sonar way"
], ],

View File

@ -4,4 +4,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)[Top 10 2017 Category A4 - XML External Entities (XXE)] * OWASP - https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)[Top 10 2017 Category A4 - XML External Entities (XXE)]
* CWE - https://cwe.mitre.org/data/definitions/611[CWE-611 - Information Exposure Through XML External Entity Reference] * CWE - https://cwe.mitre.org/data/definitions/611[CWE-611 - Information Exposure Through XML External Entity Reference]
* CWE - https://cwe.mitre.org/data/definitions/827[CWE-827 - Improper Control of Document Type Definition] * CWE - https://cwe.mitre.org/data/definitions/827[CWE-827 - Improper Control of Document Type Definition]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222608[Application Security and Development: V-222608] - The application must not be vulnerable to XML-oriented attacks.

View File

@ -46,6 +46,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"5.5.2" "5.5.2"
],
"STIG ASD 2023-06-08": [
"V-222608"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -19,6 +19,11 @@
"ruleSpecification": "RSPEC-2885", "ruleSpecification": "RSPEC-2885",
"sqKey": "S2885", "sqKey": "S2885",
"scope": "Main", "scope": "Main",
"securityStandards": {
"STIG ASD 2023-06-08": [
"V-222567"
]
},
"defaultQualityProfiles": [ "defaultQualityProfiles": [
"Sonar way" "Sonar way"
], ],

View File

@ -48,12 +48,18 @@ public class MyClass {
---- ----
== Resources == Resources
=== Articles & blog posts === Articles & blog posts
* https://web.mit.edu/6.005/www/fa14/classes/18-thread-safety/[MIT - Thread safety] * https://web.mit.edu/6.005/www/fa14/classes/18-thread-safety/[MIT - Thread safety]
* https://www.baeldung.com/java-thread-safety[Baeldung - Thread safety] * https://www.baeldung.com/java-thread-safety[Baeldung - Thread safety]
* https://www.baeldung.com/java-static[Baeldung - Static] * https://www.baeldung.com/java-static[Baeldung - Static]
=== Standards
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222567[Application Security and Development: V-222567] - The application must not be vulnerable to race conditions.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]
''' '''

View File

@ -23,6 +23,9 @@
"securityStandards": { "securityStandards": {
"CERT": [ "CERT": [
"VNA01-J." "VNA01-J."
],
"STIG ASD 2023-06-08": [
"V-222567"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -82,15 +82,17 @@ public class Person {
* https://docs.oracle.com/javase/tutorial/essential/concurrency/syncmeth.html[Oracle Java - Synchronized Methods] * https://docs.oracle.com/javase/tutorial/essential/concurrency/syncmeth.html[Oracle Java - Synchronized Methods]
* https://docs.oracle.com/javase/specs/jls/se20/html/jls-8.html#jls-8.4.3.6[Oracle SE 20 - Synchronized Methods] * https://docs.oracle.com/javase/specs/jls/se20/html/jls-8.html#jls-8.4.3.6[Oracle SE 20 - Synchronized Methods]
=== Standards
* https://wiki.sei.cmu.edu/confluence/x/4jdGBQ[CERT, VNA01-J.] - Ensure visibility of shared references to immutable objects
=== Articles & blog posts === Articles & blog posts
* https://web.mit.edu/6.005/www/fa14/classes/18-thread-safety/[MIT - Thread safety] * https://web.mit.edu/6.005/www/fa14/classes/18-thread-safety/[MIT - Thread safety]
* https://www.baeldung.com/java-thread-safety[Baeldung - Thread safety] * https://www.baeldung.com/java-thread-safety[Baeldung - Thread safety]
=== Standards
* https://wiki.sei.cmu.edu/confluence/x/4jdGBQ[CERT, VNA01-J.] - Ensure visibility of shared references to immutable objects
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222567[Application Security and Development: V-222567] - The application must not be vulnerable to race conditions.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]
''' '''

View File

@ -46,6 +46,9 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"3.4.2" "3.4.2"
],
"STIG ASD 2023-06-08": [
"V-222575"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -5,3 +5,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)[Top 10 2017 Category A7 - Cross-Site Scripting (XSS)] * OWASP - https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)[Top 10 2017 Category A7 - Cross-Site Scripting (XSS)]
* CWE - https://cwe.mitre.org/data/definitions/1004[CWE-1004 - Sensitive Cookie Without 'HttpOnly' Flag] * CWE - https://cwe.mitre.org/data/definitions/1004[CWE-1004 - Sensitive Cookie Without 'HttpOnly' Flag]
* Derived from FindSecBugs rule https://find-sec-bugs.github.io/bugs.htm#HTTPONLY_COOKIE[HTTPONLY_COOKIE] * Derived from FindSecBugs rule https://find-sec-bugs.github.io/bugs.htm#HTTPONLY_COOKIE[HTTPONLY_COOKIE]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222575[Application Security and Development: V-222575] - The application must set the HTTPOnly flag on session cookies.

View File

@ -16,6 +16,9 @@
], ],
"CWE": [ "CWE": [
369 369
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
} }
} }

View File

@ -138,6 +138,7 @@ std::optional<int> safe_division(int a, int b) {
* CERT - https://wiki.sei.cmu.edu/confluence/display/c/INT32-C.+Ensure+that+operations+on+signed+integers+do+not+result+in+overflow[INT32-C. Ensure that operations on signed integers do not result in overflow] * CERT - https://wiki.sei.cmu.edu/confluence/display/c/INT32-C.+Ensure+that+operations+on+signed+integers+do+not+result+in+overflow[INT32-C. Ensure that operations on signed integers do not result in overflow]
* CERT - https://wiki.sei.cmu.edu/confluence/x/ftYxBQ[INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors] * CERT - https://wiki.sei.cmu.edu/confluence/x/ftYxBQ[INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors]
* CWE - https://cwe.mitre.org/data/definitions/369[CWE-369 - Divide by zero] * CWE - https://cwe.mitre.org/data/definitions/369[CWE-369 - Divide by zero]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
=== External coding guidelines === External coding guidelines

View File

@ -12,6 +12,9 @@
], ],
"CWE": [ "CWE": [
369 369
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
} }
} }

View File

@ -59,16 +59,15 @@ void test_divide() {
=== Documentation === Documentation
* https://docs.oracle.com/en/java/javase/17/docs/api/java.base/java/lang/ArithmeticException.html[ArithmeticException] * https://docs.oracle.com/en/java/javase/17/docs/api/java.base/java/lang/ArithmeticException.html[ArithmeticException]
* https://docs.oracle.com/javase/specs/jls/se17/html/jls-15.html#jls-15.17.2[The Division Operator in the JLS]
=== Articles & blog posts * https://docs.oracle.com/javase/specs/jls/se17/html/jls-15.html#jls-15.17.3[The Remainder Operator in the JLS]
* CWE - https://cwe.mitre.org/data/definitions/369[CWE-369 - Divide by zero]
* https://wiki.sei.cmu.edu/confluence/x/CTZGBQ[CERT, NUM02-J.] - Ensure that division and remainder operations do not result in divide-by-zero errors
=== Standards === Standards
* https://docs.oracle.com/javase/specs/jls/se17/html/jls-15.html#jls-15.17.2[The Division Operator in the JLS] * CWE - https://cwe.mitre.org/data/definitions/369[CWE-369 - Divide by zero]
* https://docs.oracle.com/javase/specs/jls/se17/html/jls-15.html#jls-15.17.3[The Remainder Operator in the JLS] * https://wiki.sei.cmu.edu/confluence/x/CTZGBQ[CERT, NUM02-J.] - Ensure that division and remainder operations do not result in divide-by-zero errors
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -31,6 +31,9 @@
"securityStandards": { "securityStandards": {
"CWE": [ "CWE": [
369 369
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -11,6 +11,9 @@
], ],
"CWE": [ "CWE": [
369 369
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
} }
} }

View File

@ -104,10 +104,8 @@ if the denominator is zero.
* https://docs.python.org/3/reference/expressions.html#binary-arithmetic-operations[Binary arithmetic operations] * https://docs.python.org/3/reference/expressions.html#binary-arithmetic-operations[Binary arithmetic operations]
* https://docs.python.org/3/library/exceptions.html#ZeroDivisionError[ZeroDivisionError] * https://docs.python.org/3/library/exceptions.html#ZeroDivisionError[ZeroDivisionError]
=== Articles & blog posts === Standards
* CWE - https://cwe.mitre.org/data/definitions/369[CWE-369 - Divide by zero] * CWE - https://cwe.mitre.org/data/definitions/369[CWE-369 - Divide by zero]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
//=== Articles & blog posts
//=== Conference presentations
//=== Standards

View File

@ -47,6 +47,9 @@
], ],
"PCI DSS 4.0": [ "PCI DSS 4.0": [
"6.2.4" "6.2.4"
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -389,6 +389,7 @@ void tar(std::string const &s) {
* CWE - https://cwe.mitre.org/data/definitions/131[CWE-131 Incorrect Calculation of Buffer Size] * CWE - https://cwe.mitre.org/data/definitions/131[CWE-131 Incorrect Calculation of Buffer Size]
* CWE - https://cwe.mitre.org/data/definitions/193[CWE-193 Off-by-one Error] * CWE - https://cwe.mitre.org/data/definitions/193[CWE-193 Off-by-one Error]
* CWE - https://cwe.mitre.org/data/definitions/788[CWE-788 Access of Memory Location After End of Buffer] * CWE - https://cwe.mitre.org/data/definitions/788[CWE-788 Access of Memory Location After End of Buffer]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
=== Related rules === Related rules

View File

@ -5,3 +5,6 @@
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/89[CWE-89 - Improper Neutralization of Special Elements used in an SQL Command] * CWE - https://cwe.mitre.org/data/definitions/89[CWE-89 - Improper Neutralization of Special Elements used in an SQL Command]
* https://wiki.sei.cmu.edu/confluence/x/ITdGBQ[CERT, IDS00-J.] - Prevent SQL injection * https://wiki.sei.cmu.edu/confluence/x/ITdGBQ[CERT, IDS00-J.] - Prevent SQL injection
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222607[Application Security and Development: V-222607] - The application must not be vulnerable to SQL Injection.
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -50,6 +50,10 @@
"5.1.4", "5.1.4",
"5.3.4", "5.3.4",
"5.3.5" "5.3.5"
],
"STIG ASD 2023-06-08": [
"V-222607",
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -31,6 +31,11 @@
"ruleSpecification": "RSPEC-3687", "ruleSpecification": "RSPEC-3687",
"sqKey": "S3687", "sqKey": "S3687",
"scope": "All", "scope": "All",
"securityStandards": {
"STIG ASD 2023-06-08": [
"V-222567"
]
},
"defaultQualityProfiles": [ "defaultQualityProfiles": [
"Sonar way" "Sonar way"
], ],

View File

@ -38,8 +38,11 @@ User volatile * pvUser;
== Resources == Resources
=== Standards
* https://wiki.sei.cmu.edu/confluence/display/c/CON02-C.+Do+not+use+volatile+as+a+synchronization+primitive[CERT CON02-C] - Do not use volatile as a synchronization primitive * https://wiki.sei.cmu.edu/confluence/display/c/CON02-C.+Do+not+use+volatile+as+a+synchronization+primitive[CERT CON02-C] - Do not use volatile as a synchronization primitive
* {cpp} Core Guidelines - https://github.com/isocpp/CppCoreGuidelines/blob/e49158a/CppCoreGuidelines.md#cp200-use-volatile-only-to-talk-to-non-c-memory[CP.200: Use `volatile` only to talk to non-{cpp} memory] * {cpp} Core Guidelines - https://github.com/isocpp/CppCoreGuidelines/blob/e49158a/CppCoreGuidelines.md#cp200-use-volatile-only-to-talk-to-non-c-memory[CP.200: Use `volatile` only to talk to non-{cpp} memory]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222567[Application Security and Development: V-222567] - The application must not be vulnerable to race conditions.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -13,6 +13,9 @@
"securityStandards": { "securityStandards": {
"CERT": [ "CERT": [
"INT30-C." "INT30-C."
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
} }
} }

View File

@ -20,6 +20,11 @@ void test(char c) {
} }
---- ----
== Resources
include::../common/resources/standards.adoc[]
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]
''' '''

View File

@ -0,0 +1,4 @@
=== Standards
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.

View File

@ -33,4 +33,10 @@ public long Transform(int value)
} }
---- ----
== Resources
include::../common/resources/standards.adoc[]
include::../rspecator.adoc[] include::../rspecator.adoc[]

View File

@ -27,6 +27,11 @@
"ruleSpecification": "RSPEC-3949", "ruleSpecification": "RSPEC-3949",
"sqKey": "S3949", "sqKey": "S3949",
"scope": "All", "scope": "All",
"securityStandards": {
"STIG ASD 2023-06-08": [
"V-222612"
]
},
"defaultQualityProfiles": [ "defaultQualityProfiles": [
"Sonar way" "Sonar way"
], ],

View File

@ -24,4 +24,10 @@ Public Function Transform(Value As Integer) As Long
End Function End Function
---- ----
== Resources
include::../common/resources/standards.adoc[]
include::../rspecator.adoc[] include::../rspecator.adoc[]

View File

@ -46,6 +46,9 @@
"ASVS 4.0": [ "ASVS 4.0": [
"13.2.3", "13.2.3",
"4.2.2" "4.2.2"
],
"STIG ASD 2023-06-08": [
"V-222603"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -4,3 +4,5 @@
* CWE - https://cwe.mitre.org/data/definitions/352[CWE-352 - Cross-Site Request Forgery (CSRF)] * CWE - https://cwe.mitre.org/data/definitions/352[CWE-352 - Cross-Site Request Forgery (CSRF)]
* OWASP - https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration[Top 10 2017 Category A6 - Security Misconfiguration] * OWASP - https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration[Top 10 2017 Category A6 - Security Misconfiguration]
* https://owasp.org/www-community/attacks/csrf[OWASP: Cross-Site Request Forgery] * https://owasp.org/www-community/attacks/csrf[OWASP: Cross-Site Request Forgery]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222603[Application Security and Development: V-222603] - The application must protect from Cross-Site Request Forgery (CSRF) vulnerabilities.

View File

@ -41,6 +41,9 @@
"ASVS 4.0": [ "ASVS 4.0": [
"1.9.2", "1.9.2",
"9.2.1" "9.2.1"
],
"STIG ASD 2023-06-08": [
"V-222550"
] ]
} }
} }

View File

@ -8,3 +8,5 @@
* OWASP - https://owasp.org/www-project-mobile-top-10/2016-risks/m3-insecure-communication[Mobile Top 10 2016 Category M3 - Insecure Communication] * OWASP - https://owasp.org/www-project-mobile-top-10/2016-risks/m3-insecure-communication[Mobile Top 10 2016 Category M3 - Insecure Communication]
* OWASP - https://mobile-security.gitbook.io/masvs/security-requirements/0x10-v5-network_communication_requirements[Mobile AppSec Verification Standard - Network Communication Requirements] * OWASP - https://mobile-security.gitbook.io/masvs/security-requirements/0x10-v5-network_communication_requirements[Mobile AppSec Verification Standard - Network Communication Requirements]
* CWE - https://cwe.mitre.org/data/definitions/295[CWE-295 - Improper Certificate Validation] * CWE - https://cwe.mitre.org/data/definitions/295[CWE-295 - Improper Certificate Validation]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222550[Application Security and Development: V-222550] - The application must validate certificates by constructing a certification path to an accepted trust anchor.

View File

@ -39,6 +39,9 @@
"ASVS 4.0": [ "ASVS 4.0": [
"1.9.2", "1.9.2",
"9.2.1" "9.2.1"
],
"STIG ASD 2023-06-08": [
"V-222550"
] ]
} }
} }

View File

@ -60,6 +60,9 @@
"ASVS 4.0": [ "ASVS 4.0": [
"1.9.2", "1.9.2",
"9.2.1" "9.2.1"
],
"STIG ASD 2023-06-08": [
"V-222550"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -27,6 +27,11 @@
"ruleSpecification": "RSPEC-5034", "ruleSpecification": "RSPEC-5034",
"sqKey": "S5034", "sqKey": "S5034",
"scope": "All", "scope": "All",
"securityStandards": {
"STIG ASD 2023-06-08": [
"V-222567"
]
},
"defaultQualityProfiles": [ "defaultQualityProfiles": [
"Sonar way" "Sonar way"
], ],

View File

@ -50,3 +50,8 @@ int value = await ComputeAsync().AsTask();
* https://learn.microsoft.com/en-us/dotnet/api/system.threading.tasks.valuetask[ValueTask] * https://learn.microsoft.com/en-us/dotnet/api/system.threading.tasks.valuetask[ValueTask]
* https://learn.microsoft.com/en-us/dotnet/api/system.threading.tasks.valuetask-1[ValueTask<TResult>] * https://learn.microsoft.com/en-us/dotnet/api/system.threading.tasks.valuetask-1[ValueTask<TResult>]
* https://blogs.msdn.microsoft.com/dotnet/2018/11/07/understanding-the-whys-whats-and-whens-of-valuetask[Understanding the Whys, Whats, and Whens of ValueTask] * https://blogs.msdn.microsoft.com/dotnet/2018/11/07/understanding-the-whys-whats-and-whens-of-valuetask[Understanding the Whys, Whats, and Whens of ValueTask]
=== Standards
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222567[Application Security and Development: V-222567] - The application must not be vulnerable to race conditions.

View File

@ -3,3 +3,6 @@
* OWASP - https://owasp.org/Top10/A03_2021-Injection/[Top 10 2021 Category A3 - Injection] * OWASP - https://owasp.org/Top10/A03_2021-Injection/[Top 10 2021 Category A3 - Injection]
* OWASP - https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)[Top 10 2017 Category A7 - Cross-Site Scripting (XSS)] * OWASP - https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)[Top 10 2017 Category A7 - Cross-Site Scripting (XSS)]
* CWE - https://cwe.mitre.org/data/definitions/79[CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')] * CWE - https://cwe.mitre.org/data/definitions/79[CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222602[Application Security and Development: V-222602] - The application must protect from Cross-Site Scripting (XSS) vulnerabilities.
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -45,6 +45,10 @@
], ],
"ASVS 4.0": [ "ASVS 4.0": [
"5.3.3" "5.3.3"
],
"STIG ASD 2023-06-08": [
"V-222602",
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -4,3 +4,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A8_2017-Insecure_Deserialization[Top 10 2017 Category A8 - Insecure Deserialization] * OWASP - https://owasp.org/www-project-top-ten/2017/A8_2017-Insecure_Deserialization[Top 10 2017 Category A8 - Insecure Deserialization]
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/502[CWE-502 - Deserialization of Untrusted Data] * CWE - https://cwe.mitre.org/data/definitions/502[CWE-502 - Deserialization of Untrusted Data]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -50,6 +50,9 @@
"5.1.4", "5.1.4",
"5.5.1", "5.5.1",
"5.5.3" "5.5.3"
],
"STIG ASD 2023-06-08": [
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -4,3 +4,4 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A5_2017-Broken_Access_Control[Top 10 2017 Category A5 - Broken Access Control] * OWASP - https://owasp.org/www-project-top-ten/2017/A5_2017-Broken_Access_Control[Top 10 2017 Category A5 - Broken Access Control]
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/918[CWE-918 - Server-Side Request Forgery (SSRF)] * CWE - https://cwe.mitre.org/data/definitions/918[CWE-918 - Server-Side Request Forgery (SSRF)]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -49,6 +49,9 @@
"5.1.3", "5.1.3",
"5.1.4", "5.1.4",
"5.2.6" "5.2.6"
],
"STIG ASD 2023-06-08": [
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -6,3 +6,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A10_2017-Insufficient_Logging%2526Monitoring[Top 10 2017 Category A10 - Insufficient Logging & Monitoring] * OWASP - https://owasp.org/www-project-top-ten/2017/A10_2017-Insufficient_Logging%2526Monitoring[Top 10 2017 Category A10 - Insufficient Logging & Monitoring]
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/117[CWE-117 - Improper Output Neutralization for Logs] * CWE - https://cwe.mitre.org/data/definitions/117[CWE-117 - Improper Output Neutralization for Logs]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -45,6 +45,9 @@
"5.1.4", "5.1.4",
"7.3.1", "7.3.1",
"7.3.2" "7.3.2"
],
"STIG ASD 2023-06-08": [
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -4,3 +4,5 @@
* OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection] * OWASP - https://owasp.org/www-project-top-ten/2017/A1_2017-Injection[Top 10 2017 Category A1 - Injection]
* CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation] * CWE - https://cwe.mitre.org/data/definitions/20[CWE-20 - Improper Input Validation]
* CWE - https://cwe.mitre.org/data/definitions/943[CWE-943 - Improper Neutralization of Special Elements in Data Query Logic] * CWE - https://cwe.mitre.org/data/definitions/943[CWE-943 - Improper Neutralization of Special Elements in Data Query Logic]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222609[Application Security and Development: V-222609] - The application must not be subject to input handling vulnerabilities.

View File

@ -48,6 +48,9 @@
"5.1.3", "5.1.3",
"5.1.4", "5.1.4",
"5.3.4" "5.3.4"
],
"STIG ASD 2023-06-08": [
"V-222609"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -17,8 +17,12 @@
"suspicious" "suspicious"
], ],
"extra": { "extra": {
"replacementRules": [], "replacementRules": [
"legacyKeys": []
],
"legacyKeys": [
]
}, },
"defaultSeverity": "Major", "defaultSeverity": "Major",
"ruleSpecification": "RSPEC-5273", "ruleSpecification": "RSPEC-5273",
@ -32,6 +36,9 @@
121, 121,
122, 122,
676 676
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [

View File

@ -141,7 +141,7 @@ void bar(const char *src) {
* CWE - https://cwe.mitre.org/data/definitions/121[CWE-121 Stack-based Buffer Overflow] * CWE - https://cwe.mitre.org/data/definitions/121[CWE-121 Stack-based Buffer Overflow]
* CWE - https://cwe.mitre.org/data/definitions/122[CWE-122 Heap-based Buffer Overflow] * CWE - https://cwe.mitre.org/data/definitions/122[CWE-122 Heap-based Buffer Overflow]
* CWE - https://cwe.mitre.org/data/definitions/676[CWE-676 Use of Potentially Dangerous Function] * CWE - https://cwe.mitre.org/data/definitions/676[CWE-676 Use of Potentially Dangerous Function]
* STIG Viewer - https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612[Application Security and Development: V-222612] - The application must not be vulnerable to overflow attacks.
ifdef::env-github,rspecator-view[] ifdef::env-github,rspecator-view[]

View File

@ -31,9 +31,11 @@
"securityStandards": { "securityStandards": {
"CERT": [ "CERT": [
"ARR32-C." "ARR32-C."
],
"STIG ASD 2023-06-08": [
"V-222612"
] ]
}, },
"defaultQualityProfiles": [ "defaultQualityProfiles": [
"Sonar way" "Sonar way"
], ],

Some files were not shown because too many files have changed in this diff Show More