File tree Expand file tree Collapse file tree 6 files changed +24
-21
lines changed Expand file tree Collapse file tree 6 files changed +24
-21
lines changed Original file line number Diff line number Diff line change 1
1
id : plaintext-http-link-html
2
2
language : html
3
- severity : info
3
+ severity : warning
4
4
message : >-
5
- This link points to a plaintext HTTP URL. Prefer an encrypted HTTPS URL
6
- if possible.
5
+ "This link points to a plaintext HTTP URL. Prefer an encrypted HTTPS URL if possible."
7
6
note : >-
8
7
[CWE-319] Authentication Bypass by Primary Weakness
9
8
[REFERENCES]
Original file line number Diff line number Diff line change @@ -13,5 +13,5 @@ note: >-
13
13
rule :
14
14
pattern : Cipher.getInstance($MODE)
15
15
constraints :
16
- MODE :
17
- regex : ' .*/CBC/PKCS5Padding'
16
+ MODE :
17
+ regex : " .*/CBC/PKCS5Padding"
Original file line number Diff line number Diff line change @@ -2,16 +2,16 @@ id: no-null-cipher-java
2
2
severity : warning
3
3
language : java
4
4
message : >-
5
- NullCipher was detected. This will not encrypt anything; the cipher
6
- text will be the same as the plain text. Use a valid, secure cipher:
7
- Cipher.getInstance("AES/CBC/PKCS7PADDING"). See
8
- https://owasp.org/www-community/Using_the_Java_Cryptographic_Extensions
9
- for more information.
5
+ NullCipher was detected. This will not encrypt anything; the cipher
6
+ text will be the same as the plain text. Use a valid, secure cipher:
7
+ Cipher.getInstance("AES/CBC/PKCS7PADDING"). See
8
+ https://owasp.org/www-community/Using_the_Java_Cryptographic_Extensions
9
+ for more information.
10
10
note : >-
11
11
[CWE-327] Use of a Broken or Risky Cryptographic Algorithm.
12
12
[REFERENCES]
13
13
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures
14
14
rule :
15
- any :
16
- - pattern : new NullCipher($$$)
17
- - pattern : new javax.crypto.NullCipher($$$)
15
+ any :
16
+ - pattern : new NullCipher($$$)
17
+ - pattern : new javax.crypto.NullCipher($$$)
Original file line number Diff line number Diff line change @@ -10,5 +10,5 @@ note: >-
10
10
rule :
11
11
pattern : $YST.getInstance($MODE)
12
12
constraints :
13
- MODE :
14
- regex : ' RSA/[Nn][Oo][Nn][Ee]/NoPadding'
13
+ MODE :
14
+ regex : " RSA/[Nn][Oo][Nn][Ee]/NoPadding"
Original file line number Diff line number Diff line change @@ -2,14 +2,17 @@ id: rsa-padding-set-scala
2
2
language : scala
3
3
severity : warning
4
4
message : >-
5
- Usage of RSA without OAEP (Optimal Asymmetric Encryption Padding) may.
5
+ Usage of RSA without OAEP (Optimal Asymmetric Encryption Padding) may
6
+ weaken encryption. This could lead to sensitive data exposure. Instead,
7
+ use RSA with `OAEPWithMD5AndMGF1Padding` instead.
8
+
6
9
note : >-
7
10
[CWE-780] Use of RSA Algorithm without OAEP
8
11
[REFERENCES]
9
12
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures
10
13
rule :
11
14
any :
12
- - pattern : $CIPHER.getInstance($MODE)
15
+ - pattern : $CIPHER.getInstance($MODE)
13
16
constraints :
14
- MODE :
15
- regex : ' .*RSA/.*/NoPadding.*'
17
+ MODE :
18
+ regex : " .*RSA/.*/NoPadding.*"
Original file line number Diff line number Diff line change @@ -14,5 +14,6 @@ note: >-
14
14
- https://mobile-security.gitbook.io/mobile-security-testing-guide/ios-testing-guide/0x06f-testing-local-authentication
15
15
- https://shirazkhan030.medium.com/biometric-authentication-in-ios-6c53c54f17df
16
16
rule :
17
- pattern : |
18
- $X.evaluatePolicy
17
+ any :
18
+ - pattern : LAContext.evaluatePolicy
19
+ - pattern : $X.evaluatePolicy
You can’t perform that action at this time.
0 commit comments