diff --git a/descriptions/api.github.com/api.github.com.json b/descriptions/api.github.com/api.github.com.json index 75a3bc6e57..f992138d0b 100644 --- a/descriptions/api.github.com/api.github.com.json +++ b/descriptions/api.github.com/api.github.com.json @@ -61877,6 +61877,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -98653,7 +98658,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -98725,7 +98731,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/api.github.com/api.github.com.yaml b/descriptions/api.github.com/api.github.com.yaml index 7d9dea383d..62a7c425c1 100644 --- a/descriptions/api.github.com/api.github.com.yaml +++ b/descriptions/api.github.com/api.github.com.yaml @@ -44726,6 +44726,11 @@ components: nullable: true type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used to detect the + alert. code-scanning-analysis-tool-version: nullable: true type: string @@ -74543,6 +74548,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -74611,6 +74617,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.deref.json index 088e8c88d8..79adda8dac 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.json @@ -19179,6 +19179,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -65834,6 +65839,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -204663,6 +204673,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -204825,7 +204840,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -205292,6 +205308,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -205454,7 +205475,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml index bdd5c491d1..d497aabffb 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml @@ -8015,6 +8015,11 @@ paths: type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used + to detect the alert. tool: &293 type: object properties: @@ -41191,6 +41196,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -41320,6 +41326,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.json b/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.json index aaa0c38376..27e1b76ea4 100644 --- a/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.json +++ b/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.json @@ -167179,6 +167179,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -167341,7 +167346,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -167780,6 +167786,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -167942,7 +167953,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.yaml b/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.yaml index 57164a0575..bb4697515b 100644 --- a/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.yaml +++ b/descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.yaml @@ -35427,6 +35427,11 @@ paths: type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used + to detect the alert. tool: *243 most_recent_instance: *244 instances: @@ -35491,6 +35496,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -35612,6 +35618,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.2/ghes-3.2.json b/descriptions/ghes-3.2/ghes-3.2.json index 4a42555610..be41b838f7 100644 --- a/descriptions/ghes-3.2/ghes-3.2.json +++ b/descriptions/ghes-3.2/ghes-3.2.json @@ -61493,6 +61493,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -82971,7 +82976,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -83040,7 +83046,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.2/ghes-3.2.yaml b/descriptions/ghes-3.2/ghes-3.2.yaml index c2ed8333b6..fd0cd50f36 100644 --- a/descriptions/ghes-3.2/ghes-3.2.yaml +++ b/descriptions/ghes-3.2/ghes-3.2.yaml @@ -45356,6 +45356,11 @@ components: nullable: true type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used to detect the + alert. code-scanning-alert: type: object properties: @@ -63202,6 +63207,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -63266,6 +63272,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.json b/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.json index 05f85b4c36..e704851bb2 100644 --- a/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.json +++ b/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.json @@ -169023,6 +169023,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -169183,7 +169188,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -169622,6 +169628,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -169782,7 +169793,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.yaml b/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.yaml index 232c2d9965..cc02b0395c 100644 --- a/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.yaml +++ b/descriptions/ghes-3.3/dereferenced/ghes-3.3.deref.yaml @@ -35936,6 +35936,11 @@ paths: type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used + to detect the alert. tool: *242 most_recent_instance: *243 required: @@ -35999,6 +36004,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -36121,6 +36127,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.3/ghes-3.3.json b/descriptions/ghes-3.3/ghes-3.3.json index 313151a1b8..bb2072e852 100644 --- a/descriptions/ghes-3.3/ghes-3.3.json +++ b/descriptions/ghes-3.3/ghes-3.3.json @@ -61803,6 +61803,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -83235,7 +83240,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -83305,7 +83311,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.3/ghes-3.3.yaml b/descriptions/ghes-3.3/ghes-3.3.yaml index 837e466fa6..b2c4baa16a 100644 --- a/descriptions/ghes-3.3/ghes-3.3.yaml +++ b/descriptions/ghes-3.3/ghes-3.3.yaml @@ -44768,6 +44768,11 @@ components: nullable: true type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used to detect the + alert. code-scanning-alert: type: object properties: @@ -62534,6 +62539,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -62599,6 +62605,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.json b/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.json index 2cc2c445a0..a87bd2fdd6 100644 --- a/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.json +++ b/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.json @@ -182850,6 +182850,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -183010,7 +183015,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -183465,6 +183471,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -183625,7 +183636,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.yaml b/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.yaml index 40dfd6ba83..a112266374 100644 --- a/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.yaml +++ b/descriptions/ghes-3.4/dereferenced/ghes-3.4.deref.yaml @@ -38045,6 +38045,11 @@ paths: type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used + to detect the alert. tool: *257 most_recent_instance: *258 required: @@ -38108,6 +38113,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -38233,6 +38239,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.4/ghes-3.4.json b/descriptions/ghes-3.4/ghes-3.4.json index 5272bed912..cb716a1a02 100644 --- a/descriptions/ghes-3.4/ghes-3.4.json +++ b/descriptions/ghes-3.4/ghes-3.4.json @@ -64354,6 +64354,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -86418,7 +86423,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -86488,7 +86494,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.4/ghes-3.4.yaml b/descriptions/ghes-3.4/ghes-3.4.yaml index ae5f867035..6fec9d4b58 100644 --- a/descriptions/ghes-3.4/ghes-3.4.yaml +++ b/descriptions/ghes-3.4/ghes-3.4.yaml @@ -46762,6 +46762,11 @@ components: nullable: true type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used to detect the + alert. code-scanning-alert: type: object properties: @@ -65069,6 +65074,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -65134,6 +65140,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.json b/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.json index c8e1577c20..41878af6ee 100644 --- a/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.json +++ b/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.json @@ -73547,6 +73547,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -191110,6 +191115,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -191270,7 +191280,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -191725,6 +191736,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -191885,7 +191901,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.yaml b/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.yaml index 77e2cbd9d3..1326c2b9a0 100644 --- a/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.yaml +++ b/descriptions/ghes-3.5/dereferenced/ghes-3.5.deref.yaml @@ -19271,6 +19271,11 @@ paths: type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used + to detect the alert. tool: &278 type: object properties: @@ -39359,6 +39364,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -39484,6 +39490,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.5/ghes-3.5.json b/descriptions/ghes-3.5/ghes-3.5.json index f95b10019c..a6f0f77831 100644 --- a/descriptions/ghes-3.5/ghes-3.5.json +++ b/descriptions/ghes-3.5/ghes-3.5.json @@ -60215,6 +60215,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -88469,7 +88474,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -88539,7 +88545,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.5/ghes-3.5.yaml b/descriptions/ghes-3.5/ghes-3.5.yaml index 541157934c..cb47bc414a 100644 --- a/descriptions/ghes-3.5/ghes-3.5.yaml +++ b/descriptions/ghes-3.5/ghes-3.5.yaml @@ -43514,6 +43514,11 @@ components: nullable: true type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used to detect the + alert. code-scanning-analysis-tool-version: nullable: true type: string @@ -66631,6 +66636,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -66696,6 +66702,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.json b/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.json index 8508f66a01..144bfdfc56 100644 --- a/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.json +++ b/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.json @@ -75056,6 +75056,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -195790,6 +195795,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -195952,7 +195962,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -196419,6 +196430,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -196581,7 +196597,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.yaml b/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.yaml index 526030219e..9bac3ef21d 100644 --- a/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.yaml +++ b/descriptions/ghes-3.6/dereferenced/ghes-3.6.deref.yaml @@ -19521,6 +19521,11 @@ paths: type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used + to detect the alert. tool: &282 type: object properties: @@ -39830,6 +39835,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -39959,6 +39965,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/ghes-3.6/ghes-3.6.json b/descriptions/ghes-3.6/ghes-3.6.json index 876a5b38d4..c2624a0028 100644 --- a/descriptions/ghes-3.6/ghes-3.6.json +++ b/descriptions/ghes-3.6/ghes-3.6.json @@ -60713,6 +60713,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -89263,7 +89268,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -89335,7 +89341,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/ghes-3.6/ghes-3.6.yaml b/descriptions/ghes-3.6/ghes-3.6.yaml index c77a0958d7..9a7f0a7567 100644 --- a/descriptions/ghes-3.6/ghes-3.6.yaml +++ b/descriptions/ghes-3.6/ghes-3.6.yaml @@ -43971,6 +43971,11 @@ components: nullable: true type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used to detect the + alert. code-scanning-analysis-tool-version: nullable: true type: string @@ -67341,6 +67346,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -67409,6 +67415,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/github.ae/dereferenced/github.ae.deref.json b/descriptions/github.ae/dereferenced/github.ae.deref.json index 849933a549..3edcadefa3 100644 --- a/descriptions/github.ae/dereferenced/github.ae.deref.json +++ b/descriptions/github.ae/dereferenced/github.ae.deref.json @@ -156040,6 +156040,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -156201,7 +156206,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -156640,6 +156646,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -156801,7 +156812,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/github.ae/dereferenced/github.ae.deref.yaml b/descriptions/github.ae/dereferenced/github.ae.deref.yaml index b393c28254..8dfa903e13 100644 --- a/descriptions/github.ae/dereferenced/github.ae.deref.yaml +++ b/descriptions/github.ae/dereferenced/github.ae.deref.yaml @@ -33344,6 +33344,11 @@ paths: type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used + to detect the alert. tool: *229 most_recent_instance: *230 required: @@ -33409,6 +33414,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -33533,6 +33539,7 @@ paths: the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: diff --git a/descriptions/github.ae/github.ae.json b/descriptions/github.ae/github.ae.json index 0dbdb01eb4..3a5ec3c787 100644 --- a/descriptions/github.ae/github.ae.json +++ b/descriptions/github.ae/github.ae.json @@ -57168,6 +57168,11 @@ "nullable": true, "type": "string", "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "nullable": true, + "type": "string", + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -77972,7 +77977,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", @@ -78043,7 +78049,8 @@ "security", "external/cwe/cwe-022" ], - "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..." + "help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...", + "help_uri": "https://codeql.github.com/" }, "tool": { "name": "CodeQL", diff --git a/descriptions/github.ae/github.ae.yaml b/descriptions/github.ae/github.ae.yaml index 2dba512e64..35c7b7f314 100644 --- a/descriptions/github.ae/github.ae.yaml +++ b/descriptions/github.ae/github.ae.yaml @@ -41521,6 +41521,11 @@ components: nullable: true type: string description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + nullable: true + type: string + description: A link to the documentation for the rule used to detect the + alert. code-scanning-alert: type: object properties: @@ -58798,6 +58803,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: @@ -58865,6 +58871,7 @@ components: files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...' + help_uri: https://codeql.github.com/ tool: name: CodeQL guid: