File tree Expand file tree Collapse file tree 5 files changed +12
-15
lines changed
python-checks/src/main/resources/org/sonar/l10n/py/rules/python Expand file tree Collapse file tree 5 files changed +12
-15
lines changed Original file line number Diff line number Diff line change 1
- < p > In Unix, "< code > others</ code > " class refers to all users except the owner of the file and the members of the group assigned to this file.</ p >
2
- < p > Granting permissions to this group can lead to unintended access to files.</ p >
1
+ < p > In Unix file system permissions, the "< code > others</ code > " category refers to all users except the owner of the file system resource and the
2
+ members of the group assigned to this resource.</ p >
3
+ < p > Granting permissions to this category can lead to unintended access to files or directories that could allow attackers to obtain sensitive
4
+ information, disrupt services or elevate privileges.</ p >
3
5
< h2 > Ask Yourself Whether</ h2 >
4
6
< ul >
5
7
< li > The application is designed to be run on a multi-user environment. </ li >
Original file line number Diff line number Diff line change @@ -36,7 +36,6 @@ <h2>See</h2>
36
36
Exposure </ li >
37
37
< li > < a href ="https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration "> OWASP Top 10 2017 Category A6</ a > - Security
38
38
Misconfiguration </ li >
39
- < li > < a href ="https://www.ssi.gouv.fr/uploads/2014/11/RGS_v-2-0_B1.pdf "> ANSSI RGSv2</ a > - Référentiel Général de Sécurité version 2 </ li >
40
39
< li > < a href ="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf "> NIST FIPS 186-4</ a > - Digital Signature Standard (DSS) </ li >
41
40
< li > < a href ="https://cwe.mitre.org/data/definitions/326 "> MITRE, CWE-326</ a > - Inadequate Encryption Strength </ li >
42
41
</ ul >
Original file line number Diff line number Diff line change 1
1
< p > An LDAP client authenticates to an LDAP server with a "bind request" which provides, among other, a < a
2
- href ="https://ldapwiki.com/wiki/Simple%20Authentication "> simple authentication method</ a > .</ p >
2
+ href ="https://web.archive.org/web/20220922153922/https:// ldapwiki.com/wiki/Simple%20Authentication "> simple authentication method</ a > .</ p >
3
3
< p > Simple authentication in LDAP can be used with three different mechanisms:</ p >
4
4
< ul >
5
5
< li > < em > Anonymous Authentication Mechanism</ em > by performing a bind request with a username and password value of zero length. </ li >
@@ -40,6 +40,7 @@ <h2>See</h2>
40
40
< li > < a href ="https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication "> OWASP Top 10 2017 Category A2</ a > - Broken Authentication
41
41
</ li >
42
42
< li > < a href ="https://cwe.mitre.org/data/definitions/521 "> MITRE, CWE-521</ a > - Weak Password Requirements </ li >
43
- < li > < a href ="https://ldapwiki.com/wiki/Simple%20Authentication "> ldapwiki.com</ a > - Simple Authentication </ li >
43
+ < li > < a href ="https://web.archive.org/web/20220922153922/https://ldapwiki.com/wiki/Simple%20Authentication "> ldapwiki.com</ a > - Simple Authentication
44
+ </ li >
44
45
</ ul >
45
46
Original file line number Diff line number Diff line change 1
- < p > Delivering code in production with debug features activated is security-sensitive. It has led in the past to the following vulnerabilities:</ p >
2
- < ul >
3
- < li > < a href ="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999007 "> CVE-2018-1999007</ a > </ li >
4
- < li > < a href ="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5306 "> CVE-2015-5306</ a > </ li >
5
- < li > < a href ="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2006 "> CVE-2013-2006</ a > </ li >
6
- </ ul >
7
- < p > An application’s debug features enable developers to find bugs more easily and thus facilitate also the work of attackers. It often gives access to
8
- detailed information on both the system running the application and users.</ p >
1
+ < p > Development tools and frameworks usually have options to make debugging easier for developers. Although these features are useful during
2
+ development, they should never be enabled for applications deployed in production. Debug instructions or error messages can leak detailed information
3
+ about the system, like the application’s path or file names.</ p >
9
4
< h2 > Ask Yourself Whether</ h2 >
10
5
< ul >
11
6
< li > The code or configuration enabling the application debug features is deployed on production servers or distributed to end users. </ li >
12
7
< li > The application runs by default with debug features activated. </ li >
13
8
</ ul >
14
9
< p > There is a risk if you answered yes to any of those questions.</ p >
15
10
< h2 > Recommended Secure Coding Practices</ h2 >
16
- < p > Do not enable debug features on production servers or applications distributed to end users.</ p >
11
+ < p > Do not enable debugging features on production servers or applications distributed to end users.</ p >
17
12
< h2 > Sensitive Code Example</ h2 >
18
13
< pre >
19
14
from django.conf import settings
Original file line number Diff line number Diff line change 3
3
"languages" : [
4
4
" PY"
5
5
],
6
- "latest-update" : " 2023-02-03T14:24:32.827513Z " ,
6
+ "latest-update" : " 2023-02-21T12:35:43.435616Z " ,
7
7
"options" : {
8
8
"no-language-in-filenames" : true ,
9
9
"preserve-filenames" : true
You can’t perform that action at this time.
0 commit comments