Skip to content

Commit 476b93b

Browse files
SONARJAVA-4657 Update rules metadata (#4477)
1 parent a7fa130 commit 476b93b

28 files changed

Lines changed: 2123 additions & 1234 deletions

File tree

external-reports/src/main/resources/org/sonar/l10n/java/rules/checkstyle/rules.json

Lines changed: 359 additions & 156 deletions
Large diffs are not rendered by default.

external-reports/src/main/resources/org/sonar/l10n/java/rules/pmd/rules.json

Lines changed: 513 additions & 309 deletions
Large diffs are not rendered by default.

external-reports/src/main/resources/org/sonar/l10n/java/rules/spotbugs/findsecbugs-rules.json

Lines changed: 82 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,12 @@
101101
"type": "VULNERABILITY",
102102
"url": "https://find-sec-bugs.github.io/bugs.htm#CUSTOM_MESSAGE_DIGEST"
103103
},
104+
{
105+
"key": "DANGEROUS_PERMISSION_COMBINATION",
106+
"name": "Dangerous combination of permissions granted",
107+
"type": "VULNERABILITY",
108+
"url": "https://find-sec-bugs.github.io/bugs.htm#DANGEROUS_PERMISSION_COMBINATION"
109+
},
104110
{
105111
"key": "DEFAULT_HTTP_CLIENT",
106112
"name": "DefaultHttpClient with default constructor is not compatible with TLS 1.2",
@@ -131,6 +137,18 @@
131137
"type": "VULNERABILITY",
132138
"url": "https://find-sec-bugs.github.io/bugs.htm#EL_INJECTION"
133139
},
140+
{
141+
"key": "ENTITY_LEAK",
142+
"name": "Unexpected property leak",
143+
"type": "VULNERABILITY",
144+
"url": "https://find-sec-bugs.github.io/bugs.htm#ENTITY_LEAK"
145+
},
146+
{
147+
"key": "ENTITY_MASS_ASSIGNMENT",
148+
"name": "Mass assignment",
149+
"type": "VULNERABILITY",
150+
"url": "https://find-sec-bugs.github.io/bugs.htm#ENTITY_MASS_ASSIGNMENT"
151+
},
134152
{
135153
"key": "ESAPI_ENCRYPTOR",
136154
"name": "Use of ESAPI Encryptor",
@@ -155,15 +173,21 @@
155173
"type": "VULNERABILITY",
156174
"url": "https://find-sec-bugs.github.io/bugs.htm#FORMAT_STRING_MANIPULATION"
157175
},
176+
{
177+
"key": "GROOVY_SHELL",
178+
"name": "Potential code injection when using GroovyShell",
179+
"type": "VULNERABILITY",
180+
"url": "https://find-sec-bugs.github.io/bugs.htm#GROOVY_SHELL"
181+
},
158182
{
159183
"key": "HARD_CODE_KEY",
160-
"name": "Hard Coded Key",
184+
"name": "Hard coded key",
161185
"type": "VULNERABILITY",
162186
"url": "https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_KEY"
163187
},
164188
{
165189
"key": "HARD_CODE_PASSWORD",
166-
"name": "Hard Coded Password",
190+
"name": "Hard coded password",
167191
"type": "VULNERABILITY",
168192
"url": "https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_PASSWORD"
169193
},
@@ -191,6 +215,12 @@
191215
"type": "VULNERABILITY",
192216
"url": "https://find-sec-bugs.github.io/bugs.htm#HTTP_RESPONSE_SPLITTING"
193217
},
218+
{
219+
"key": "IMPROPER_UNICODE",
220+
"name": "Improper handling of Unicode transformations",
221+
"type": "VULNERABILITY",
222+
"url": "https://find-sec-bugs.github.io/bugs.htm#IMPROPER_UNICODE"
223+
},
194224
{
195225
"key": "INFORMATION_EXPOSURE_THROUGH_AN_ERROR_MESSAGE",
196226
"name": "Information Exposure Through An Error Message",
@@ -247,7 +277,7 @@
247277
},
248278
{
249279
"key": "JSP_XSLT",
250-
"name": "A malicious XSLT could be provided",
280+
"name": "A malicious XSLT could be provided to the JSP tag",
251281
"type": "VULNERABILITY",
252282
"url": "https://find-sec-bugs.github.io/bugs.htm#JSP_XSLT"
253283
},
@@ -275,6 +305,18 @@
275305
"type": "VULNERABILITY",
276306
"url": "https://find-sec-bugs.github.io/bugs.htm#MALICIOUS_XSLT"
277307
},
308+
{
309+
"key": "MODIFICATION_AFTER_VALIDATION",
310+
"name": "String is modified after validation and not before it",
311+
"type": "VULNERABILITY",
312+
"url": "https://find-sec-bugs.github.io/bugs.htm#MODIFICATION_AFTER_VALIDATION"
313+
},
314+
{
315+
"key": "NORMALIZATION_AFTER_VALIDATION",
316+
"name": "String is normalzied after validation and not before it",
317+
"type": "VULNERABILITY",
318+
"url": "https://find-sec-bugs.github.io/bugs.htm#NORMALIZATION_AFTER_VALIDATION"
319+
},
278320
{
279321
"key": "NULL_CIPHER",
280322
"name": "NullCipher is insecure",
@@ -293,6 +335,12 @@
293335
"type": "VULNERABILITY",
294336
"url": "https://find-sec-bugs.github.io/bugs.htm#OGNL_INJECTION"
295337
},
338+
{
339+
"key": "OVERLY_PERMISSIVE_FILE_PERMISSION",
340+
"name": "Overly permissive file permission",
341+
"type": "VULNERABILITY",
342+
"url": "https://find-sec-bugs.github.io/bugs.htm#OVERLY_PERMISSIVE_FILE_PERMISSION"
343+
},
296344
{
297345
"key": "PADDING_ORACLE",
298346
"name": "Cipher is susceptible to Padding Oracle",
@@ -347,6 +395,12 @@
347395
"type": "VULNERABILITY",
348396
"url": "https://find-sec-bugs.github.io/bugs.htm#REQUESTDISPATCHER_FILE_DISCLOSURE"
349397
},
398+
{
399+
"key": "RPC_ENABLED_EXTENSIONS",
400+
"name": "Enabling extensions in Apache XML RPC server or client.",
401+
"type": "VULNERABILITY",
402+
"url": "https://find-sec-bugs.github.io/bugs.htm#RPC_ENABLED_EXTENSIONS"
403+
},
350404
{
351405
"key": "RSA_KEY_SIZE",
352406
"name": "RSA usage with short key",
@@ -359,6 +413,12 @@
359413
"type": "VULNERABILITY",
360414
"url": "https://find-sec-bugs.github.io/bugs.htm#RSA_NO_PADDING"
361415
},
416+
{
417+
"key": "SAML_IGNORE_COMMENTS",
418+
"name": "Ignoring XML comments in SAML may lead to authentication bypass",
419+
"type": "VULNERABILITY",
420+
"url": "https://find-sec-bugs.github.io/bugs.htm#SAML_IGNORE_COMMENTS"
421+
},
362422
{
363423
"key": "SCALA_COMMAND_INJECTION",
364424
"name": "Potential Command Injection (Scala)",
@@ -367,7 +427,7 @@
367427
},
368428
{
369429
"key": "SCALA_PATH_TRAVERSAL_IN",
370-
"name": "Potential Path Traversal (file read)",
430+
"name": "Potential Path Traversal using Scala API (file read)",
371431
"type": "VULNERABILITY",
372432
"url": "https://find-sec-bugs.github.io/bugs.htm#SCALA_PATH_TRAVERSAL_IN"
373433
},
@@ -557,6 +617,12 @@
557617
"type": "VULNERABILITY",
558618
"url": "https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_TURBINE"
559619
},
620+
{
621+
"key": "SQL_INJECTION_VERTX",
622+
"name": "Potential SQL Injection with Vert.x Sql Client",
623+
"type": "VULNERABILITY",
624+
"url": "https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_VERTX"
625+
},
560626
{
561627
"key": "SSL_CONTEXT",
562628
"name": "Weak SSLContext",
@@ -611,6 +677,12 @@
611677
"type": "VULNERABILITY",
612678
"url": "https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_FREEMARKER"
613679
},
680+
{
681+
"key": "TEMPLATE_INJECTION_PEBBLE",
682+
"name": "Potential template injection with Pebble",
683+
"type": "VULNERABILITY",
684+
"url": "https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_PEBBLE"
685+
},
614686
{
615687
"key": "TEMPLATE_INJECTION_VELOCITY",
616688
"name": "Potential template injection with Velocity",
@@ -695,6 +767,12 @@
695767
"type": "VULNERABILITY",
696768
"url": "https://find-sec-bugs.github.io/bugs.htm#WICKET_ENDPOINT"
697769
},
770+
{
771+
"key": "WICKET_XSS1",
772+
"name": "Disabling HTML escaping put the application at risk for XSS",
773+
"type": "VULNERABILITY",
774+
"url": "https://find-sec-bugs.github.io/bugs.htm#WICKET_XSS1"
775+
},
698776
{
699777
"key": "XML_DECODER",
700778
"name": "XMLDecoder usage",

0 commit comments

Comments
 (0)