Skip to content

Commit

Permalink
Update rule metadata (#470)
Browse files Browse the repository at this point in the history
Co-authored-by: petertrr <petertrr>
  • Loading branch information
github-actions[bot] authored and sonartech committed Nov 27, 2024
1 parent 523d22f commit 8f9e0a2
Show file tree
Hide file tree
Showing 36 changed files with 38 additions and 38 deletions.
4 changes: 2 additions & 2 deletions sonar-text-plugin/sonarpedia-secrets/sonarpedia.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@
"languages": [
"SECRETS"
],
"latest-update": "2024-10-31T13:12:57.243065442Z",
"latest-update": "2024-11-26T09:25:55.849890649Z",
"options": {
"no-language-in-filenames": true,
"preserve-filenames": true
}
}
}
4 changes: 2 additions & 2 deletions sonar-text-plugin/sonarpedia-text/sonarpedia.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@
"languages": [
"TEXT"
],
"latest-update": "2024-10-31T13:13:11.713685066Z",
"latest-update": "2024-11-26T09:26:04.996895117Z",
"options": {
"no-language-in-filenames": true,
"preserve-filenames": true
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ <h4>Phishing and spam</h4>
<p>An attacker can use this secret to spam users or lure them into links to a malicious domain controlled by the attacker.</p>
<p>Spam can cause users to be exposed to the following:</p>
<ul>
<li> Unsolicited, inappropriate content, such as pornographic material </li>
<li> Unsolicited, inappropriate content </li>
<li> Fraudulent attempts to trick users into sending information or money </li>
<li> Abusive or hateful statements </li>
<li> False advertising or fraudulent claims </li>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ <h4>Phishing and spam</h4>
<p>An attacker can use this secret to spam users or lure them into links to a malicious domain controlled by the attacker.</p>
<p>Spam can cause users to be exposed to the following:</p>
<ul>
<li> Unsolicited, inappropriate content, such as pornographic material </li>
<li> Unsolicited, inappropriate content </li>
<li> Fraudulent attempts to trick users into sending information or money </li>
<li> Abusive or hateful statements </li>
<li> False advertising or fraudulent claims </li>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ <h4>Phishing and spam</h4>
<p>An attacker can use this secret to spam users or lure them into links to a malicious domain controlled by the attacker.</p>
<p>Spam can cause users to be exposed to the following:</p>
<ul>
<li> Unsolicited, inappropriate content, such as pornographic material </li>
<li> Unsolicited, inappropriate content </li>
<li> Fraudulent attempts to trick users into sending information or money </li>
<li> Abusive or hateful statements </li>
<li> False advertising or fraudulent claims </li>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ <h4>Phishing and spam</h4>
<p>An attacker can use this secret to spam users or lure them into links to a malicious domain controlled by the attacker.</p>
<p>Spam can cause users to be exposed to the following:</p>
<ul>
<li> Unsolicited, inappropriate content, such as pornographic material </li>
<li> Unsolicited, inappropriate content </li>
<li> Fraudulent attempts to trick users into sending information or money </li>
<li> Abusive or hateful statements </li>
<li> False advertising or fraudulent claims </li>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ <h4>Phishing and spam</h4>
<p>An attacker can use this webhook to spam users or lure them into links to a malicious domain controlled by the attacker.</p>
<p>Spam can cause users to be exposed to the following:</p>
<ul>
<li> Unsolicited, inappropriate content, such as pornographic material </li>
<li> Unsolicited, inappropriate content </li>
<li> Fraudulent attempts to trick users into sending information or money </li>
<li> Abusive or hateful statements </li>
<li> False advertising or fraudulent claims </li>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ <h4>Compromise of sensitive data</h4>
authentication secret could be able to access it. Depending on the type of data that is compromised, it could lead to privacy violations, identity
theft, financial loss, or other negative outcomes.</p>
<p>In most cases, a company suffering a sensitive data compromise will face a reputational loss when the security issue is publicly disclosed.</p>
<h4>Application takeover</h4>
<h4>Data visualization corruption and takeover</h4>
<p>With control over the Grafana application, the attacker can modify dashboards, alter data sources, or inject malicious code. This can result in the
manipulation of displayed data, misleading visualizations, or even the introduction of backdoors for further exploitation.</p>
<p>The attacker may even attempt to escalate their privileges within the Grafana environment. By gaining administrative access or higher-level
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"type": "VULNERABILITY",
"code": {
"impacts": {
"SECURITY": "HIGH"
"SECURITY": "BLOCKER"
},
"attribute": "TRUSTWORTHY"
},
Expand Down

0 comments on commit 8f9e0a2

Please sign in to comment.