Skip to content

Latest commit

 

History

History
9 lines (8 loc) · 3.55 KB

Microsoft.NetFramework.Analyzers.md

File metadata and controls

9 lines (8 loc) · 3.55 KB
Sr. No. Rule ID Title Category Enabled CodeFix Description
1 CA1058 Types should not extend certain base types Design True False An externally visible type extends certain base types. Use one of the alternatives.
2 CA2153 Do Not Catch Corrupted State Exceptions Security True False Catching corrupted state exceptions could mask errors (such as access violations), resulting in inconsistent state of execution or making it easier for attackers to compromise system. Instead, catch and handle a more specific set of exception type(s) or re-throw the exception
3 CA3075 Insecure DTD processing in XML Security True False Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null. 
4 CA3076 Insecure XSLT script processing. Security True False Providing an insecure XsltSettings instance and an insecure XmlResolver instance to XslCompiledTransform.Load method is potentially unsafe as it allows processing script within XSL, which on an untrusted XSL input may lead to malicious code execution. Either replace the insecure XsltSettings argument with XsltSettings.Default or an instance that has disabled document function and script execution, or replace the XmlResolver argurment with null or an XmlSecureResolver instance. This message may be suppressed if the input is known to be from a trusted source and external resource resolution from locations that are not known in advance must be supported.
5 CA3077 Insecure Processing in API Design, XmlDocument and XmlTextReader Security True False Enabling DTD processing on all instances derived from XmlTextReader or  XmlDocument and using XmlUrlResolver for resolving external XML entities may lead to information disclosure. Ensure to set the XmlResolver property to null, create an instance of XmlSecureResolver when processing untrusted input, or use XmlReader.Create method with a secure XmlReaderSettings argument. Unless you need to enable it, ensure the DtdProcessing property is set to false. 
6 CA3147 Mark Verb Handlers With Validate Antiforgery Token Security True False Missing ValidateAntiForgeryTokenAttribute on controller action {0}.