Module: PWN::SAST::Factory
- Defined in:
- lib/pwn/sast/factory.rb
Overview
SAST Module used to identify if source may result in exposing the application to XXE vulnerabilities. For more information see: www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing
Class Method Summary collapse
-
.authors ⇒ Object
- Author(s)
-
0day Inc.
-
.help ⇒ Object
Display Usage for this Module.
-
.scan(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::SAST::Factory.scan( :dir_path => ‘optional path to dir defaults to .’ :git_repo_root_uri => ‘optional http uri of git repo scanned’ ).
-
.security_references ⇒ Object
Used primarily to map NIST 800-53 Revision 4 Security Controls web.nvd.nist.gov/view/800-53/Rev4/impact?impactName=HIGH to PWN Exploit & Static Code Anti-Pattern Matching Modules to Determine the level of Testing Coverage w/ PWN.
Class Method Details
.authors ⇒ Object
- Author(s)
-
0day Inc. <[email protected]>
59 60 61 62 63 |
# File 'lib/pwn/sast/factory.rb', line 59 public_class_method def self. "AUTHOR(S): 0day Inc. <[email protected]> " end |
.help ⇒ Object
Display Usage for this Module
67 68 69 70 71 72 73 74 75 76 |
# File 'lib/pwn/sast/factory.rb', line 67 public_class_method def self.help puts "USAGE: sast_arr = #{self}.scan( :dir_path => 'optional path to dir defaults to .', :git_repo_root_uri => 'optional http uri of git repo scanned' ) #{self}.authors " end |
.scan(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::SAST::Factory.scan(
:dir_path => 'optional path to dir defaults to .' :git_repo_root_uri => 'optional http uri of git repo scanned')
19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 |
# File 'lib/pwn/sast/factory.rb', line 19 public_class_method def self.scan(opts = {}) dir_path = opts[:dir_path] git_repo_root_uri = opts[:git_repo_root_uri].to_s.scrub test_case_filter = " grep -in \ -e DocumentBuilderFactory \ -e XMLInputFactory \ -e SAXParserFactory {PWN_SAST_SRC_TARGET} 2> /dev/null " include_extensions = %w[.java .class .jar .war .ear .nar .properties .aj .jsp .jspx .jstm .jsptml .jnlp .jad .ser .gsp] PWN::SAST::TestCaseEngine.execute( test_case_filter: test_case_filter, security_references: security_references, dir_path: dir_path, include_extensions: include_extensions, git_repo_root_uri: git_repo_root_uri ) end |
.security_references ⇒ Object
Used primarily to map NIST 800-53 Revision 4 Security Controls web.nvd.nist.gov/view/800-53/Rev4/impact?impactName=HIGH to PWN Exploit & Static Code Anti-Pattern Matching Modules to Determine the level of Testing Coverage w/ PWN.
45 46 47 48 49 50 51 52 53 54 55 |
# File 'lib/pwn/sast/factory.rb', line 45 public_class_method def self.security_references { sast_module: self, section: 'DEVELOPER CONFIGURATION MANAGEMENT', nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SA-10', cwe_id: '611', cwe_uri: 'https://cwe.mitre.org/data/definitions/611.html' } rescue StandardError => e raise e end |