Skip to content

Commit

Permalink
Fix typos in SSRF query messages
Browse files Browse the repository at this point in the history
  • Loading branch information
rzhade3 committed Jun 18, 2024
1 parent e1423d9 commit 7d5e6ce
Show file tree
Hide file tree
Showing 8 changed files with 16 additions and 16 deletions.
4 changes: 2 additions & 2 deletions java/spring/security/injection/tainted-url-host.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ rules:
This could allow an attacker to send data to their own server,
potentially exposing sensitive data such as cookies or authorization
information sent with this request. They could also probe internal
servers or other resources that the server runnig this code can access.
servers or other resources that the server running this code can access.
(This is called server-side request forgery, or SSRF.) Do not allow
arbitrary hosts. Instead, create an allowlist for approved hosts hardcode
arbitrary hosts. Instead, create an allowlist for approved hosts, hardcode
the correct host, or ensure that the user data can only affect the path or parameters.
options:
interfile: true
Expand Down
4 changes: 2 additions & 2 deletions php/lang/security/injection/tainted-url-host.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,10 @@ rules:
to send data
to their own server, potentially exposing sensitive data such as cookies or authorization information
sent with this request.
They could also probe internal servers or other resources that the server runnig this code can access.
They could also probe internal servers or other resources that the server running this code can access.
(This is called
server-side request forgery, or SSRF.) Do not allow arbitrary hosts. Instead, create an allowlist
for approved hosts hardcode
for approved hosts, or hardcode
the correct host.
metadata:
cwe:
Expand Down
4 changes: 2 additions & 2 deletions python/django/security/injection/tainted-url-host.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@ rules:
message: User data flows into the host portion of this manually-constructed URL. This could allow an
attacker to send data to their own server, potentially exposing sensitive data such as cookies or
authorization information sent with this request. They could also probe internal servers or other
resources that the server runnig this code can access. (This is called server-side request forgery,
or SSRF.) Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts hardcode the
resources that the server running this code can access. (This is called server-side request forgery,
or SSRF.) Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts, or hardcode the
correct host.
metadata:
cwe:
Expand Down
4 changes: 2 additions & 2 deletions python/flask/security/injection/tainted-url-host.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,9 +7,9 @@ rules:
This could allow an attacker to send data to their own server, potentially
exposing sensitive data such as cookies or authorization information sent
with this request. They could also probe internal servers or other
resources that the server runnig this code can access. (This is called
resources that the server running this code can access. (This is called
server-side request forgery, or SSRF.) Do not allow arbitrary hosts.
Instead, create an allowlist for approved hosts hardcode the correct host.
Instead, create an allowlist for approved hosts, or hardcode the correct host.
metadata:
cwe:
- 'CWE-918: Server-Side Request Forgery (SSRF)'
Expand Down
2 changes: 1 addition & 1 deletion ruby/rails/security/injection/tainted-url-host.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ rules:
This could allow an attacker to send data to their own server, potentially
exposing sensitive data such as cookies or authorization information sent
with this request. They could also probe internal servers or other resources
that the server runnig this code can access. (This is called server-side
that the server running this code can access. (This is called server-side
request forgery, or SSRF.) Do not allow arbitrary hosts. Use the `ssrf_filter`
gem and guard the url construction with `SsrfFilter(...)`, or create
an allowlist for approved hosts.
Expand Down
4 changes: 2 additions & 2 deletions scala/lang/security/audit/dispatch-ssrf.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,8 @@ rules:
A parameter being passed directly into `url` most likely lead to SSRF.
This could allow an attacker to send data to their own server, potentially exposing sensitive data
sent with this request.
They could also probe internal servers or other resources that the server runnig this code can access.
Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts hardcode the correct
They could also probe internal servers or other resources that the server running this code can access.
Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts, or hardcode the correct
host.
metadata:
cwe:
Expand Down
4 changes: 2 additions & 2 deletions scala/lang/security/audit/io-source-ssrf.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,8 @@ rules:
A parameter being passed directly into `fromURL` most likely lead to SSRF.
This could allow an attacker to send data to their own server, potentially exposing sensitive data
sent with this request.
They could also probe internal servers or other resources that the server runnig this code can access.
Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts hardcode the correct
They could also probe internal servers or other resources that the server running this code can access.
Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts, or hardcode the correct
host.
metadata:
cwe:
Expand Down
6 changes: 3 additions & 3 deletions scala/lang/security/audit/scalaj-http-ssrf.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,11 +15,11 @@ rules:
...
}
message: >-
A parameter being passed directly into `Http` most likely lead to SSRF.
A parameter being passed directly into `Http` can likely lead to SSRF.
This could allow an attacker to send data to their own server, potentially exposing sensitive data
sent with this request.
They could also probe internal servers or other resources that the server runnig this code can access.
Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts hardcode the correct
They could also probe internal servers or other resources that the server running this code can access.
Do not allow arbitrary hosts. Instead, create an allowlist for approved hosts, or hardcode the correct
host.
metadata:
cwe:
Expand Down

0 comments on commit 7d5e6ce

Please sign in to comment.