Create rule S6988 (#3991)
* Create rule S6988 * Add initial rule content * Generalize content and move it to a shared location. --------- Co-authored-by: jamie-anderson-sonarsource <jamie-anderson-sonarsource@users.noreply.github.com> Co-authored-by: Jamie Anderson <jamie.anderson@sonarsource.com>
This commit is contained in:
parent
56beff2e4d
commit
c61e87ceda
2
rules/S6988/metadata.json
Normal file
2
rules/S6988/metadata.json
Normal file
@ -0,0 +1,2 @@
|
||||
{
|
||||
}
|
64
rules/S6988/secrets/metadata.json
Normal file
64
rules/S6988/secrets/metadata.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"title": "MapBox secret access tokens should not be disclosed",
|
||||
"type": "VULNERABILITY",
|
||||
"code": {
|
||||
"impacts": {
|
||||
"SECURITY": "HIGH"
|
||||
},
|
||||
"attribute": "TRUSTWORTHY"
|
||||
},
|
||||
"status": "ready",
|
||||
"remediation": {
|
||||
"func": "Constant\/Issue",
|
||||
"constantCost": "30min"
|
||||
},
|
||||
"tags": [
|
||||
"cwe",
|
||||
"cert"
|
||||
],
|
||||
"extra": {
|
||||
"replacementRules": [
|
||||
|
||||
],
|
||||
"legacyKeys": [
|
||||
|
||||
]
|
||||
},
|
||||
"defaultSeverity": "Blocker",
|
||||
"ruleSpecification": "RSPEC-6988",
|
||||
"sqKey": "S6988",
|
||||
"scope": "All",
|
||||
"securityStandards": {
|
||||
"CWE": [
|
||||
798,
|
||||
259
|
||||
],
|
||||
"OWASP": [
|
||||
"A3"
|
||||
],
|
||||
"CERT": [
|
||||
"MSC03-J."
|
||||
],
|
||||
"OWASP Top 10 2021": [
|
||||
"A7"
|
||||
],
|
||||
"PCI DSS 3.2": [
|
||||
"6.5.10"
|
||||
],
|
||||
"PCI DSS 4.0": [
|
||||
"6.2.4"
|
||||
],
|
||||
"ASVS 4.0": [
|
||||
"2.10.4",
|
||||
"3.5.2",
|
||||
"6.4.1"
|
||||
],
|
||||
"STIG ASD 2023-06-08": [
|
||||
"V-222642"
|
||||
]
|
||||
},
|
||||
"defaultQualityProfiles": [
|
||||
"Sonar way"
|
||||
],
|
||||
"quickfix": "unknown"
|
||||
}
|
45
rules/S6988/secrets/rule.adoc
Normal file
45
rules/S6988/secrets/rule.adoc
Normal file
@ -0,0 +1,45 @@
|
||||
|
||||
include::../../../shared_content/secrets/description.adoc[]
|
||||
|
||||
== Why is this an issue?
|
||||
|
||||
include::../../../shared_content/secrets/rationale.adoc[]
|
||||
|
||||
=== What is the potential impact?
|
||||
|
||||
MapBox secret access tokens are used to authenticate MapBox API calls. Each
|
||||
token is assigned one or more scopes that determine which API calls can be made
|
||||
using that token.
|
||||
|
||||
Below are some real-world scenarios that illustrate some impacts of an attacker
|
||||
exploiting the access token.
|
||||
|
||||
include::../../../shared_content/secrets/impact/data_modification.adoc[]
|
||||
|
||||
include::../../../shared_content/secrets/impact/non_repudiation.adoc[]
|
||||
|
||||
== How to fix it
|
||||
|
||||
include::../../../shared_content/secrets/fix/revoke.adoc[]
|
||||
|
||||
include::../../../shared_content/secrets/fix/vault.adoc[]
|
||||
|
||||
=== Code examples
|
||||
|
||||
:example_secret: sk.eyJ1IjoiZXhhbXBsZSIsImEiOiJFeEFtUGxFIn0.IsnG4xwWhubMpVzDrQfFWg
|
||||
:example_name: mapbox.access-token
|
||||
:example_env: MAPBOX_ACCESS_TOKEN
|
||||
|
||||
include::../../../shared_content/secrets/examples.adoc[]
|
||||
|
||||
//=== How does this work?
|
||||
|
||||
//=== Pitfalls
|
||||
|
||||
//=== Going the extra mile
|
||||
|
||||
== Resources
|
||||
|
||||
include::../../../shared_content/secrets/resources/standards.adoc[]
|
||||
|
||||
//=== Benchmarks
|
10
shared_content/secrets/impact/data_modification.adoc
Normal file
10
shared_content/secrets/impact/data_modification.adoc
Normal file
@ -0,0 +1,10 @@
|
||||
==== Modification of application data
|
||||
|
||||
Applications may rely on data that cannot be distributed with the application
|
||||
code. This may be due to the size of the data, or because the data is regularly
|
||||
updated. This data is downloaded by the application as it is needed.
|
||||
|
||||
If an attacker can gain access to an authentication secret, they may be able to
|
||||
alter or delete this application data. This may cause parts of the application
|
||||
to misbehave or stop working. Maliciously altered data could also contain
|
||||
undesirable content which results in reputational damage.
|
Loading…
x
Reference in New Issue
Block a user