Create rule S6988 (#3991)

* Create rule S6988

* Add initial rule content

* Generalize content and move it to a shared location.

---------

Co-authored-by: jamie-anderson-sonarsource <jamie-anderson-sonarsource@users.noreply.github.com>
Co-authored-by: Jamie Anderson <jamie.anderson@sonarsource.com>
This commit is contained in:
github-actions[bot] 2024-06-28 09:53:36 +01:00 committed by GitHub
parent 56beff2e4d
commit c61e87ceda
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 121 additions and 0 deletions

View File

@ -0,0 +1,2 @@
{
}

View File

@ -0,0 +1,64 @@
{
"title": "MapBox secret access tokens should not be disclosed",
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
},
"attribute": "TRUSTWORTHY"
},
"status": "ready",
"remediation": {
"func": "Constant\/Issue",
"constantCost": "30min"
},
"tags": [
"cwe",
"cert"
],
"extra": {
"replacementRules": [
],
"legacyKeys": [
]
},
"defaultSeverity": "Blocker",
"ruleSpecification": "RSPEC-6988",
"sqKey": "S6988",
"scope": "All",
"securityStandards": {
"CWE": [
798,
259
],
"OWASP": [
"A3"
],
"CERT": [
"MSC03-J."
],
"OWASP Top 10 2021": [
"A7"
],
"PCI DSS 3.2": [
"6.5.10"
],
"PCI DSS 4.0": [
"6.2.4"
],
"ASVS 4.0": [
"2.10.4",
"3.5.2",
"6.4.1"
],
"STIG ASD 2023-06-08": [
"V-222642"
]
},
"defaultQualityProfiles": [
"Sonar way"
],
"quickfix": "unknown"
}

View File

@ -0,0 +1,45 @@
include::../../../shared_content/secrets/description.adoc[]
== Why is this an issue?
include::../../../shared_content/secrets/rationale.adoc[]
=== What is the potential impact?
MapBox secret access tokens are used to authenticate MapBox API calls. Each
token is assigned one or more scopes that determine which API calls can be made
using that token.
Below are some real-world scenarios that illustrate some impacts of an attacker
exploiting the access token.
include::../../../shared_content/secrets/impact/data_modification.adoc[]
include::../../../shared_content/secrets/impact/non_repudiation.adoc[]
== How to fix it
include::../../../shared_content/secrets/fix/revoke.adoc[]
include::../../../shared_content/secrets/fix/vault.adoc[]
=== Code examples
:example_secret: sk.eyJ1IjoiZXhhbXBsZSIsImEiOiJFeEFtUGxFIn0.IsnG4xwWhubMpVzDrQfFWg
:example_name: mapbox.access-token
:example_env: MAPBOX_ACCESS_TOKEN
include::../../../shared_content/secrets/examples.adoc[]
//=== How does this work?
//=== Pitfalls
//=== Going the extra mile
== Resources
include::../../../shared_content/secrets/resources/standards.adoc[]
//=== Benchmarks

View File

@ -0,0 +1,10 @@
==== Modification of application data
Applications may rely on data that cannot be distributed with the application
code. This may be due to the size of the data, or because the data is regularly
updated. This data is downloaded by the application as it is needed.
If an attacker can gain access to an authentication secret, they may be able to
alter or delete this application data. This may cause parts of the application
to misbehave or stop working. Maliciously altered data could also contain
undesirable content which results in reputational damage.