Skip to content

Commit 39210be

Browse files
Update rules metadata (#1391)
1 parent f0ac790 commit 39210be

File tree

5 files changed

+12
-15
lines changed

5 files changed

+12
-15
lines changed

python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S2612.html

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
1-
<p>In Unix, "<code>others</code>" class refers to all users except the owner of the file and the members of the group assigned to this file.</p>
2-
<p>Granting permissions to this group can lead to unintended access to files.</p>
1+
<p>In Unix file system permissions, the "<code>others</code>" category refers to all users except the owner of the file system resource and the
2+
members of the group assigned to this resource.</p>
3+
<p>Granting permissions to this category can lead to unintended access to files or directories that could allow attackers to obtain sensitive
4+
information, disrupt services or elevate privileges.</p>
35
<h2>Ask Yourself Whether</h2>
46
<ul>
57
<li> The application is designed to be run on a multi-user environment. </li>

python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S4426.html

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ <h2>See</h2>
3636
Exposure </li>
3737
<li> <a href="https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration">OWASP Top 10 2017 Category A6</a> - Security
3838
Misconfiguration </li>
39-
<li> <a href="https://www.ssi.gouv.fr/uploads/2014/11/RGS_v-2-0_B1.pdf">ANSSI RGSv2</a> - Référentiel Général de Sécurité version 2 </li>
4039
<li> <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf">NIST FIPS 186-4</a> - Digital Signature Standard (DSS) </li>
4140
<li> <a href="https://cwe.mitre.org/data/definitions/326">MITRE, CWE-326</a> - Inadequate Encryption Strength </li>
4241
</ul>

python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S4433.html

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
<p>An LDAP client authenticates to an LDAP server with a "bind request" which provides, among other, a <a
2-
href="https://ldapwiki.com/wiki/Simple%20Authentication">simple authentication method</a>.</p>
2+
href="https://web.archive.org/web/20220922153922/https://ldapwiki.com/wiki/Simple%20Authentication">simple authentication method</a>.</p>
33
<p>Simple authentication in LDAP can be used with three different mechanisms:</p>
44
<ul>
55
<li> <em>Anonymous Authentication Mechanism</em> by performing a bind request with a username and password value of zero length. </li>
@@ -40,6 +40,7 @@ <h2>See</h2>
4040
<li> <a href="https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication">OWASP Top 10 2017 Category A2</a> - Broken Authentication
4141
</li>
4242
<li> <a href="https://cwe.mitre.org/data/definitions/521">MITRE, CWE-521</a> - Weak Password Requirements </li>
43-
<li> <a href="https://ldapwiki.com/wiki/Simple%20Authentication">ldapwiki.com</a>- Simple Authentication </li>
43+
<li> <a href="https://web.archive.org/web/20220922153922/https://ldapwiki.com/wiki/Simple%20Authentication">ldapwiki.com</a>- Simple Authentication
44+
</li>
4445
</ul>
4546

python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S4507.html

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,14 @@
1-
<p>Delivering code in production with debug features activated is security-sensitive. It has led in the past to the following vulnerabilities:</p>
2-
<ul>
3-
<li> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999007">CVE-2018-1999007</a> </li>
4-
<li> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5306">CVE-2015-5306</a> </li>
5-
<li> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2006">CVE-2013-2006</a> </li>
6-
</ul>
7-
<p>An application’s debug features enable developers to find bugs more easily and thus facilitate also the work of attackers. It often gives access to
8-
detailed information on both the system running the application and users.</p>
1+
<p>Development tools and frameworks usually have options to make debugging easier for developers. Although these features are useful during
2+
development, they should never be enabled for applications deployed in production. Debug instructions or error messages can leak detailed information
3+
about the system, like the application’s path or file names.</p>
94
<h2>Ask Yourself Whether</h2>
105
<ul>
116
<li> The code or configuration enabling the application debug features is deployed on production servers or distributed to end users. </li>
127
<li> The application runs by default with debug features activated. </li>
138
</ul>
149
<p>There is a risk if you answered yes to any of those questions.</p>
1510
<h2>Recommended Secure Coding Practices</h2>
16-
<p>Do not enable debug features on production servers or applications distributed to end users.</p>
11+
<p>Do not enable debugging features on production servers or applications distributed to end users.</p>
1712
<h2>Sensitive Code Example</h2>
1813
<pre>
1914
from django.conf import settings

sonarpedia.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"languages": [
44
"PY"
55
],
6-
"latest-update": "2023-02-03T14:24:32.827513Z",
6+
"latest-update": "2023-02-21T12:35:43.435616Z",
77
"options": {
88
"no-language-in-filenames": true,
99
"preserve-filenames": true

0 commit comments

Comments
 (0)