Skip to content

Commit 8594aa6

Browse files
JAVASE-9 Update rule metadata (#27)
Co-authored-by: dorian-burihabwa-sonarsource <[email protected]>
1 parent 9563519 commit 8594aa6

File tree

14 files changed

+52
-20
lines changed

14 files changed

+52
-20
lines changed

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S2095.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "BUG",
44
"code": {
55
"impacts": {
6-
"RELIABILITY": "HIGH"
6+
"RELIABILITY": "BLOCKER"
77
},
88
"attribute": "COMPLETE"
99
},

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S2189.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "BUG",
44
"code": {
55
"impacts": {
6-
"RELIABILITY": "HIGH"
6+
"RELIABILITY": "BLOCKER"
77
},
88
"attribute": "LOGICAL"
99
},

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S2689.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "BUG",
44
"code": {
55
"impacts": {
6-
"RELIABILITY": "HIGH"
6+
"RELIABILITY": "BLOCKER"
77
},
88
"attribute": "COMPLETE"
99
},

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S2755.html

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,9 +170,13 @@ <h3>Standards</h3>
170170
<li> OWASP - <a href="https://owasp.org/Top10/A05_2021-Security_Misconfiguration/">Top 10 2021 Category A5 - Security Misconfiguration</a> </li>
171171
<li> OWASP - <a href="https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)">Top 10 2017 Category A4 - XML External
172172
Entities (XXE)</a> </li>
173+
<li> OWASP - <a href="https://owasp.org/www-project-mobile-top-10/2023-risks/m4-insufficient-input-output-validation">Mobile Top 10 2024 Category M4
174+
- Insufficient Input/Output Validation</a> </li>
175+
<li> OWASP - <a href="https://owasp.org/www-project-mobile-top-10/2023-risks/m8-security-misconfiguration">Mobile Top 10 2024 Category M8 - Security
176+
Misconfiguration</a> </li>
173177
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/611">CWE-611 - Information Exposure Through XML External Entity Reference</a> </li>
174178
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/827">CWE-827 - Improper Control of Document Type Definition</a> </li>
175-
<li> STIG Viewer - <a href="https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222608">Application Security and
179+
<li> STIG Viewer - <a href="https://stigviewer.com/stigs/application_security_and_development/2024-12-06/finding/V-222608">Application Security and
176180
Development: V-222608</a> - The application must not be vulnerable to XML-oriented attacks. </li>
177181
</ul>
178182

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S2755.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "VULNERABILITY",
44
"code": {
55
"impacts": {
6-
"SECURITY": "HIGH"
6+
"SECURITY": "BLOCKER"
77
},
88
"attribute": "COMPLETE"
99
},
@@ -31,6 +31,10 @@
3131
"OWASP Top 10 2021": [
3232
"A5"
3333
],
34+
"OWASP Mobile Top 10 2024": [
35+
"M4",
36+
"M8"
37+
],
3438
"PCI DSS 3.2": [
3539
"6.5.1"
3640
],

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S3516.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "CODE_SMELL",
44
"code": {
55
"impacts": {
6-
"MAINTAINABILITY": "HIGH"
6+
"MAINTAINABILITY": "BLOCKER"
77
},
88
"attribute": "LOGICAL"
99
},

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S3518.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ <h3>Standards</h3>
5252
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/369">CWE-369 - Divide by zero</a> </li>
5353
<li> <a href="https://wiki.sei.cmu.edu/confluence/x/CTZGBQ">CERT, NUM02-J.</a> - Ensure that division and remainder operations do not result in
5454
divide-by-zero errors </li>
55-
<li> STIG Viewer - <a href="https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222612">Application Security and
55+
<li> STIG Viewer - <a href="https://stigviewer.com/stigs/application_security_and_development/2024-12-06/finding/V-222612">Application Security and
5656
Development: V-222612</a> - The application must not be vulnerable to overflow attacks. </li>
5757
</ul>
5858

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S3546.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "BUG",
44
"code": {
55
"impacts": {
6-
"RELIABILITY": "HIGH"
6+
"RELIABILITY": "BLOCKER"
77
},
88
"attribute": "COMPLETE"
99
},

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S6373.html

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,9 +96,13 @@ <h3>Standards</h3>
9696
<li> OWASP - <a href="https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)">Top 10 2017 - Category A4 - XML External
9797
Entities (XXE)</a> </li>
9898
<li> OWASP - <a href="https://owasp.org/Top10/A05_2021-Security_Misconfiguration/">Top 10 2021 - Category A5 - Security Misconfiguration</a> </li>
99+
<li> OWASP - <a href="https://owasp.org/www-project-mobile-top-10/2023-risks/m4-insufficient-input-output-validation">Mobile Top 10 2024 Category M4
100+
- Insufficient Input/Output Validation</a> </li>
101+
<li> OWASP - <a href="https://owasp.org/www-project-mobile-top-10/2023-risks/m8-security-misconfiguration">Mobile Top 10 2024 Category M8 - Security
102+
Misconfiguration</a> </li>
99103
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/611">CWE-611 - Improper Restriction of XML External Entity Reference</a> </li>
100104
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/827">CWE-827 - Improper Control of Document Type Definition</a> </li>
101-
<li> STIG Viewer - <a href="https://stigviewer.com/stig/application_security_and_development/2023-06-08/finding/V-222608">Application Security and
105+
<li> STIG Viewer - <a href="https://stigviewer.com/stigs/application_security_and_development/2024-12-06/finding/V-222608">Application Security and
102106
Development: V-222608</a> - The application must not be vulnerable to XML-oriented attacks. </li>
103107
</ul>
104108

java-symbolic-execution/java-symbolic-execution-plugin/src/main/resources/org/sonar/l10n/java/rules/javase/S6373.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "VULNERABILITY",
44
"code": {
55
"impacts": {
6-
"SECURITY": "HIGH"
6+
"SECURITY": "BLOCKER"
77
},
88
"attribute": "CONVENTIONAL"
99
},
@@ -30,6 +30,10 @@
3030
"OWASP Top 10 2021": [
3131
"A5"
3232
],
33+
"OWASP Mobile Top 10 2024": [
34+
"M4",
35+
"M8"
36+
],
3337
"PCI DSS 3.2": [
3438
"6.5.1"
3539
],

0 commit comments

Comments
 (0)