Skip to content

Commit

Permalink
Add references and technology metadata
Browse files Browse the repository at this point in the history
  • Loading branch information
mschwager committed Jan 12, 2024
1 parent 1cee223 commit 9eecfaa
Show file tree
Hide file tree
Showing 29 changed files with 49 additions and 0 deletions.
3 changes: 3 additions & 0 deletions generic/container-privileged.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-250: Execution with Unnecessary Privileges"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://docs.docker.com/engine/reference/commandline/run/
pattern-either:
- pattern: docker ... --privileged
- pattern: docker ... --cap-add=ALL
Expand Down
3 changes: 3 additions & 0 deletions generic/container-user-root.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-250: Execution with Unnecessary Privileges"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://docs.docker.com/engine/reference/commandline/run/
pattern-either:
- pattern: docker ... -u root
- pattern: docker ... --user root
Expand Down
3 changes: 3 additions & 0 deletions generic/curl-insecure.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-295: Improper Certificate Validation"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://curl.se/docs/manpage.html
pattern-either:
# A space character was left at the end of some patterns to help ensure
# that the intended flag was used, and minimize the chance that another,
Expand Down
3 changes: 3 additions & 0 deletions generic/curl-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://curl.se/docs/manpage.html
pattern-either:
- pattern: curl ... http://
- pattern: curl ... ftp://
3 changes: 3 additions & 0 deletions generic/gpg-insecure-flags.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-295: Improper Certificate Validation"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://www.gnupg.org/gph/de/manual/r1023.html
pattern-either:
- pattern: gpg ... --allow-non-selfsigned-uid
- pattern: gpg ... --allow-freeform-uid
Expand Down
3 changes: 3 additions & 0 deletions generic/installer-allow-untrusted.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,11 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-494: Download of Code Without Integrity Check"
confidence: HIGH
likelihood: HIGH
impact: HIGH
references:
- https://ss64.com/mac/installer.html
pattern: installer ... -allowUntrusted
3 changes: 3 additions & 0 deletions generic/openssl-insecure-flags.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-295: Improper Certificate Validation"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://www.openssl.org/docs/manmaster/man1/
pattern-either:
# A space character was left at the end of some patterns to help ensure
# that the intended flag was used, and minimize the chance that another,
Expand Down
3 changes: 3 additions & 0 deletions generic/ssh-disable-host-key-checking.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,11 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-295: Improper Certificate Validation"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://man7.org/linux/man-pages/man1/ssh.1.html
pattern: ssh ... StrictHostKeyChecking=no
3 changes: 3 additions & 0 deletions generic/tar-insecure-flags.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-73: External Control of File Name or Path"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://man7.org/linux/man-pages/man1/tar.1.html
pattern-either:
# A space character was left at the end of some patterns to help ensure
# that the intended flag was used, and minimize the chance that another,
Expand Down
3 changes: 3 additions & 0 deletions generic/wget-no-check-certificate.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,13 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [shell]
cwe: "CWE-295: Improper Certificate Validation"
confidence: MEDIUM
likelihood: MEDIUM
impact: HIGH
references:
- https://linux.die.net/man/1/wget
pattern-either:
- pattern: wget ... --no-check-certificate
- pattern: wget ... --no-hsts
1 change: 1 addition & 0 deletions kotlin/gc-call.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ rules:
metadata:
category: best-practice
subcategory: [audit]
technology: [java, kotlin]
confidence: HIGH
likelihood: HIGH
impact: LOW
Expand Down
1 change: 1 addition & 0 deletions kotlin/mongo-hostname-verification-disabled.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ rules:
metadata:
category: security
subcategory: [audit]
technology: [java, kotlin, mongodb]
cwe: "CWE-295: Improper Certificate Validation"
confidence: HIGH
likelihood: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/apt-key-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible, apt]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/apt-key-validate-certs-disabled.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-295: Improper Certificate Validation"
subcategory: [audit]
technology: [ansible, apt]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/apt-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible, apt]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/dnf-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible, dnf]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/dnf-validate-certs-disabled.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-295: Improper Certificate Validation"
subcategory: [audit]
technology: [ansible, dnf]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/get-url-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/get-url-validate-certs-disabled.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-295: Improper Certificate Validation"
subcategory: [audit]
technology: [ansible]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/rpm-key-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible, rpm]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/rpm-key-validate-certs-disabled.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-295: Improper Certificate Validation"
subcategory: [audit]
technology: [ansible, rpm]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/unarchive-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/unarchive-validate-certs-disabled.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-295: Improper Certificate Validation"
subcategory: [audit]
technology: [ansible]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/wrm-cert-validation-ignore.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-295: Improper Certificate Validation"
subcategory: [audit]
technology: [ansible]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/yum-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible, yum]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/yum-validate-certs-disabled.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-295: Improper Certificate Validation"
subcategory: [audit]
technology: [ansible, yum]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/zypper-repository-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible, zypper]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/ansible/zypper-unencrypted-url.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-319: Cleartext Transmission of Sensitive Information"
subcategory: [audit]
technology: [ansible, zypper]
confidence: HIGH
likelihood: HIGH
impact: HIGH
Expand Down
1 change: 1 addition & 0 deletions yaml/docker-compose/port-all-interfaces.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ rules:
category: security
cwe: "CWE-1327: Binding to an Unrestricted IP Address"
subcategory: [audit]
technology: [docker, compose]
confidence: LOW
likelihood: LOW
impact: LOW
Expand Down

0 comments on commit 9eecfaa

Please sign in to comment.