diff --git a/mappings/cvss_v3/cvss_v3.json b/mappings/cvss_v3/cvss_v3.json index 66093cd..32ef14c 100644 --- a/mappings/cvss_v3/cvss_v3.json +++ b/mappings/cvss_v3/cvss_v3.json @@ -281,10 +281,6 @@ "id": "content_spoofing", "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N", "children": [ - { - "id": "iframe_injection", - "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" - }, { "id": "impersonation_via_broken_link_hijacking", "cvss_v3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" @@ -298,7 +294,7 @@ "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" }, { - "id": "email_html_injection", + "id": "html_injection", "cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ] diff --git a/mappings/remediation_advice/remediation_advice.json b/mappings/remediation_advice/remediation_advice.json index 978af0b..f28018d 100644 --- a/mappings/remediation_advice/remediation_advice.json +++ b/mappings/remediation_advice/remediation_advice.json @@ -588,12 +588,6 @@ "http://projects.webappsec.org/w/page/13246917/Content%20Spoofing" ], "children": [ - { - "id": "iframe_injection", - "references": [ - "http://resources.infosecinstitute.com/iframe-security-risk/" - ] - }, { "id": "impersonation_via_broken_link_hijacking", "remediation_advice": "In order to prevent this type of injection consider the following solutions:\n\n1. Keep track of company's public 3rd party accounts, that includes social media. Whenever one is deleted, make sure it is not referenced in the application\n2. Monitor all hyperlinks pointing to 3rd party resources, as well as any other external references for that matter, and make sure that they do not become invalid, e.g. check for change in HTTP response code. In many cases it may be possible for anyone to claim such URL's and share new content.\n3. Always treat all user input as untrusted data." @@ -610,8 +604,8 @@ "remediation_advice": "Even if unsafe HTML tags like `