Skip to content

Commit 159790e

Browse files
abhinav-nainTimmyBugcrowdRRudder
authored
[Q3'25 - Release] Cloud Security + Server Side Injection Updates + Admin Expansion (#483)
* [INTERIM BRANCH] Server-Side-Injection-Updates (#479) * Update vulnerability-rating-taxonomy.json * Update vulnerability-rating-taxonomy.json Small spelling update --------- Co-authored-by: RRudder <[email protected]> * [INTERIM BRANCH] Cloud-Security (#476) * Update vulnerability-rating-taxonomy.json * Updates * [INTERIM BRANCH] Admin Portal Expansion (#469) * Admin Portal Expansion Add: Server Security Misconfiguration - Exposed Portal - Protected - P5 Server Security Misconfiguration - Exposed Portal - Admin Portal - P1 Server Security Misconfiguration - Exposed Portal - Non-Admin Portal - P3 Remove: Server Security Misconfiguration - Exposed Admin Portal - To Internet - P3 * Indicators of Attack Adding Indicators of Attack based on this: #466 issue. * Revert "Indicators of Attack" This reverts commit 3e0c017. * Release Changes * Adding SCW --------- Co-authored-by: Timmy <[email protected]> Co-authored-by: RRudder <[email protected]>
1 parent 6211aad commit 159790e

File tree

6 files changed

+280
-18
lines changed

6 files changed

+280
-18
lines changed

CHANGELOG.md

Lines changed: 28 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,29 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/) and this p
1212

1313
### Changed
1414

15+
## [v1.17](https://github.com/bugcrowd/vulnerability-rating-taxonomy/compare/v1.16...v1.17) - 2025-08-19
16+
17+
### Added
18+
19+
- Cloud Security - Identity and Access Management (IAM) Misconfigurations - Overly Permissive IAM Roles - P2
20+
- Cloud Security - Identity and Access Management (IAM) Misconfigurations - Publicly Accessible IAM Credentials - P1
21+
- Cloud Security - Storage Misconfigurations - Publicly Accessible Cloud Storage - Varies
22+
- Cloud Security - Storage Misconfigurations - Unencrypted Sensitive Data at Rest - P2
23+
- Cloud Security - Network Configuration Issues - Open Management Ports to the Internet - P3
24+
- Cloud Security - Network Configuration Issues - Lack of Network Segmentation - P3
25+
- Cloud Security - Misconfigured Services and APIs - Exposed Debug or Admin Interfaces - Varies
26+
- Cloud Security - Misconfigured Services and APIs - Insecure API Endpoints - P4
27+
- Cloud Security - Logging and Monitoring Issues - Disabled or Insufficient Logging - P5
28+
- Server-Side Injection - Exposed Data - Non-Sensitive Data - P5
29+
- Server-Side Injection - Exposed Data - Sensitive Data - Varies
30+
- Server Security Misconfiguration - Exposed Portal - Protected - P5
31+
- Server Security Misconfiguration - Exposed Portal - Admin Portal - P1
32+
- Server Security Misconfiguration - Exposed Portal - Non-Admin Portal - P3
33+
34+
### Removed
35+
36+
-
37+
1538
## [v1.16](https://github.com/bugcrowd/vulnerability-rating-taxonomy/compare/v1.15.1...v1.16) - 2025-06-23
1639

1740
### Added
@@ -23,7 +46,7 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/) and this p
2346
- AI Application Security - Sensitive Information Disclosure - Cross-Tenant PII Leakage/Exposure - P1
2447
- AI Application Security - Sensitive Information Disclosure - Key Leak - P1
2548
- AI Application Security - Remote Code Execution - Full System Compromise - P1
26-
- AI Application Security - Remote Code Execution - Sandboxed Container Code Execution - P2
49+
- AI Application Security - Remote Code Execution - Sandboxed Container Code Execution - P2
2750
- AI Application Security - Prompt Injection - System Prompt Leakage - P2
2851
- AI Application Security - Vector and Embedding Weaknesses - Embedding Exfiltration / Model Extraction - P2
2952
- AI Application Security - Vector and Embedding Weaknesses - Semantic Indexing - P3
@@ -33,16 +56,16 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/) and this p
3356
- AI Application Security - Denial-of-Service (DoS) - Tenant-Scoped - P4
3457
- AI Application Security - Adversarial Example Injection - AI Misclassification Attacks - P4
3558
- AI Application Security - Improper Output Handling - Cross-Site Scripting (XSS) - P3
36-
- AI Application Security - Improper Output Handling - Markdown/HTML Injection - P4
59+
- AI Application Security - Improper Output Handling - Markdown/HTML Injection - P4
3760
- AI Application Security - Improper Input Handling - ANSI Escape Codes - P5
3861
- AI Application Security - Improper Input Handling - Unicode Confusables - P5
3962
- AI Application Security - Improper Input Handling - RTL Overrides - P5
4063

4164
### Removed
4265

43-
- AI Application Security - Large Language Model (LLM) Security - LLM Output Handling - P1
44-
- AI Application Security - Large Language Model (LLM) Security - Prompt Injection - P1
45-
- AI Application Security - Large Language Model (LLM) Security - Training Data Poisoning - P1
66+
- AI Application Security - Large Language Model (LLM) Security - LLM Output Handling - P1
67+
- AI Application Security - Large Language Model (LLM) Security - Prompt Injection - P1
68+
- AI Application Security - Large Language Model (LLM) Security - Training Data Poisoning - P1
4669
- AI Application Security - Large Language Model (LLM) Security - Excessive Agency/Permission Manipulation - P2
4770

4871
### Other

deprecated-node-mapping.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -328,5 +328,8 @@
328328
},
329329
"ai_application_security.llm_security.training_data_poisoning": {
330330
"1.16": "other"
331+
},
332+
"server_security_misconfiguration.exposed_admin_portal.to_internet": {
333+
"1.17": "other"
331334
}
332335
}

mappings/cvss_v3/cvss_v3.json

Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -482,6 +482,72 @@
482482
}
483483
]
484484
},
485+
{
486+
"id": "cloud_security",
487+
"children": [
488+
{
489+
"id": "identity_and_access_management_iam_misconfigurations",
490+
"children": [
491+
{
492+
"id": "overly_permissive_iam_roles",
493+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
494+
},
495+
{
496+
"id": "publicly_accessible_iam_credentials",
497+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
498+
}
499+
]
500+
},
501+
{
502+
"id": "logging_and_monitoring_issues",
503+
"children": [
504+
{
505+
"id": "disabled_or_insufficient_logging",
506+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
507+
}
508+
]
509+
},
510+
{
511+
"id": "misconfigured_services_and_apis",
512+
"children": [
513+
{
514+
"id": "exposed_debug_or_admin_interfaces",
515+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
516+
},
517+
{
518+
"id": "insecure_api_endpoints",
519+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
520+
}
521+
]
522+
},
523+
{
524+
"id": "network_configuration_issues",
525+
"children": [
526+
{
527+
"id": "lack_of_network_segmentation",
528+
"cvss_v3": "AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"
529+
},
530+
{
531+
"id": "open_management_ports_to_the_internet",
532+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
533+
}
534+
]
535+
},
536+
{
537+
"id": "storage_misconfigurations",
538+
"children": [
539+
{
540+
"id": "publicly_accessible_cloud_storage",
541+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
542+
},
543+
{
544+
"id": "unencrypted_sensitive_data_at_rest",
545+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
546+
}
547+
]
548+
}
549+
]
550+
},
485551
{
486552
"id": "cross_site_request_forgery_csrf",
487553
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
@@ -1069,6 +1135,23 @@
10691135
"id": "email_verification_bypass",
10701136
"cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"
10711137
},
1138+
{
1139+
"id": "exposed_portal",
1140+
"children": [
1141+
{
1142+
"id": "admin_portal",
1143+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
1144+
},
1145+
{
1146+
"id": "non_admin_portal",
1147+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
1148+
},
1149+
{
1150+
"id": "protected",
1151+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N"
1152+
}
1153+
]
1154+
},
10721155
{
10731156
"id": "insecure_ssl",
10741157
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N"

mappings/remediation_advice/remediation_advice.json

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -485,6 +485,14 @@
485485
}
486486
]
487487
},
488+
{
489+
"id": "cloud_security",
490+
"remediation_advice": "Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.",
491+
"references": [
492+
"https://owasp.org/www-project-cloud-native-application-security-top-10/",
493+
"https://cloudsecurityalliance.org/artifacts/security-guidance-v4/"
494+
]
495+
},
488496
{
489497
"id": "cross_site_request_forgery_csrf",
490498
"remediation_advice": "1. Consider using a known and secure CSRF synchronizer API and apply the generated CSRF token to every request. If infeasible to apply to every request, generate a CSRF token for the entire session and apply that to every request or, at minimum, every request considered sensitive. Always make sure to check the actual CSRF token.\n2. Consider verifying using same-origin rules to the source and target by checking the `Origin` and `Referer` headers.\n3. Consider using the `Double Submit Cookie` pattern.\n4. Consider using the `Encrypted Token` pattern.\n5. Consider protecting REST services by using the `X-Requested-With: XMLHttpRequest` header in all requests.\n6. Consider using re-authentication in cases where the request is particularly sensitive. This is the most effective CSRF prevention technique, however it does disturb the entire user experience.",
@@ -1410,12 +1418,10 @@
14101418
]
14111419
},
14121420
{
1413-
"id": "exposed_admin_portal",
1414-
"children": [
1415-
{
1416-
"id": "to_internet",
1417-
"remediation_advice": "As a best practice, consider restricting admin portal access to internal users only."
1418-
}
1421+
"id": "exposed_portal",
1422+
"remediation_advice": "Implement network-level access controls and authentication gateways to prevent unauthorized access to exposed portals, regardless of privilege level.",
1423+
"references": [
1424+
"https://nordlayer.com/learn/access-control/best-practices-and-implementation/"
14191425
]
14201426
},
14211427
{

third-party-mappings/remediation_training/secure-code-warrior-links.json

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,21 @@
127127
"client_side_injection.binary_planting.no_privilege_escalation": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=client_side_injection:binary_planting:no_privilege_escalation&redirect=true",
128128
"client_side_injection.binary_planting.non_default_folder_privilege_escalation": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=client_side_injection:binary_planting:non_default_folder_privilege_escalation&redirect=true",
129129
"client_side_injection.binary_planting.privilege_escalation": null,
130+
"cloud_security": null,
131+
"cloud_security.identity_and_access_management_iam_misconfigurations": null,
132+
"cloud_security.identity_and_access_management_iam_misconfigurations.overly_permissive_iam_roles": null,
133+
"cloud_security.identity_and_access_management_iam_misconfigurations.publicly_accessible_iam_credentials": null,
134+
"cloud_security.logging_and_monitoring_issues": null,
135+
"cloud_security.logging_and_monitoring_issues.disabled_or_insufficient_logging": null,
136+
"cloud_security.misconfigured_services_and_apis": null,
137+
"cloud_security.misconfigured_services_and_apis.exposed_debug_or_admin_interfaces": null,
138+
"cloud_security.misconfigured_services_and_apis.insecure_api_endpoints": null,
139+
"cloud_security.network_configuration_issues": null,
140+
"cloud_security.network_configuration_issues.lack_of_network_segmentation": null,
141+
"cloud_security.network_configuration_issues.open_management_ports_to_the_internet": null,
142+
"cloud_security.storage_misconfigurations": null,
143+
"cloud_security.storage_misconfigurations.publicly_accessible_cloud_storage": null,
144+
"cloud_security.storage_misconfigurations.unencrypted_sensitive_data_at_rest": null,
130145
"cross_site_request_forgery_csrf": null,
131146
"cross_site_request_forgery_csrf.action_specific": null,
132147
"cross_site_request_forgery_csrf.action_specific.authenticated_action": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=cross_site_request_forgery_csrf:action_specific:authenticated_action&redirect=true",
@@ -379,8 +394,10 @@
379394
"server_security_misconfiguration.directory_listing_enabled.non_sensitive_data_exposure": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:directory_listing_enabled:non_sensitive_data_exposure&redirect=true",
380395
"server_security_misconfiguration.directory_listing_enabled.sensitive_data_exposure": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:directory_listing_enabled:sensitive_data_exposure&redirect=true",
381396
"server_security_misconfiguration.email_verification_bypass": null,
382-
"server_security_misconfiguration.exposed_admin_portal": null,
383-
"server_security_misconfiguration.exposed_admin_portal.to_internet": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:exposed_admin_portal:to_internet&redirect=true",
397+
"server_security_misconfiguration.exposed_portal": null,
398+
"server_security_misconfiguration.exposed_portal.admin_portal": null,
399+
"server_security_misconfiguration.exposed_portal.non_admin_portal": null,
400+
"server_security_misconfiguration.exposed_portal.protected": null,
384401
"server_security_misconfiguration.fingerprinting_banner_disclosure": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:fingerprinting_banner_disclosure&redirect=true",
385402
"server_security_misconfiguration.insecure_ssl": null,
386403
"server_security_misconfiguration.insecure_ssl.certificate_error": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_security_misconfiguration:insecure_ssl:certificate_error&redirect=true",
@@ -466,6 +483,9 @@
466483
"server_side_injection.content_spoofing.impersonation_via_broken_link_hijacking": null,
467484
"server_side_injection.content_spoofing.rtlo": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_side_injection:content_spoofing:rtlo&redirect=true",
468485
"server_side_injection.content_spoofing.text_injection": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_side_injection:content_spoofing:text_injection&redirect=true",
486+
"server_side_injection.exposed_data": null,
487+
"server_side_injection.exposed_data.non_sensitive_data": null,
488+
"server_side_injection.exposed_data.sensitive_data": null,
469489
"server_side_injection.file_inclusion": null,
470490
"server_side_injection.file_inclusion.local": "https://integration-api.securecodewarrior.com/api/v1/trial?id=bugcrowd&mappingList=vrt&mappingKey=server_side_injection:file_inclusion:local&redirect=true",
471491
"server_side_injection.http_response_manipulation": null,

0 commit comments

Comments
 (0)