diff --git a/javascript/express/security/audit/xss/mustache/var-in-href.mustache b/javascript/express/security/audit/xss/mustache/var-in-href.mustache deleted file mode 100644 index b47e8200f0..0000000000 --- a/javascript/express/security/audit/xss/mustache/var-in-href.mustache +++ /dev/null @@ -1,62 +0,0 @@ - - - - - - Demo Mustache.JS - - - - - - - - - -
-
-
-
- - - - - - - - - - diff --git a/javascript/express/security/audit/xss/mustache/var-in-href.yaml b/javascript/express/security/audit/xss/mustache/var-in-href.yaml deleted file mode 100644 index 6f6148dca9..0000000000 --- a/javascript/express/security/audit/xss/mustache/var-in-href.yaml +++ /dev/null @@ -1,38 +0,0 @@ -rules: -- id: var-in-href - message: >- - Detected a template variable used in an anchor tag with - the 'href' attribute. This allows a malicious actor to - input the 'javascript:' URI and is subject to cross- - site scripting (XSS) attacks. If using a relative URL, - start with a literal forward slash and concatenate the URL, - like this: href='/{{link}}'. You may also consider setting - the Content Security Policy (CSP) header. - metadata: - cwe: - - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - owasp: - - A07:2017 - Cross-Site Scripting (XSS) - - A03:2021 - Injection - references: - - https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss#:~:text=javascript:%20URI - - https://github.com/pugjs/pug/issues/2952 - category: security - technology: - - express - cwe2022-top25: true - cwe2021-top25: true - subcategory: - - audit - likelihood: LOW - impact: MEDIUM - confidence: LOW - languages: - - regex - severity: WARNING - paths: - include: - - '*.mustache' - - '*.hbs' - - '*.html' - pattern-regex: From: {{ from_email }} -

To: - {% for recipient in recipients %} - {{ recipient }}  - {% endfor %} -

-

Subject: {{subject}}

-
- {{ message }} -
- -
diff --git a/python/django/security/audit/xss/template-href-var.yaml b/python/django/security/audit/xss/template-href-var.yaml deleted file mode 100644 index 5069f3952d..0000000000 --- a/python/django/security/audit/xss/template-href-var.yaml +++ /dev/null @@ -1,41 +0,0 @@ -rules: -- id: template-href-var - message: >- - Detected a template variable used in an anchor tag with - the 'href' attribute. This allows a malicious actor to - input the 'javascript:' URI and is subject to cross- - site scripting (XSS) attacks. Use the 'url' template tag - to safely generate a URL. You may also consider setting - the Content Security Policy (CSP) header. - metadata: - cwe: - - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - owasp: - - A07:2017 - Cross-Site Scripting (XSS) - - A03:2021 - Injection - references: - - https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss - - https://docs.djangoproject.com/en/3.1/ref/templates/builtins/#url - - https://content-security-policy.com/ - category: security - technology: - - django - cwe2022-top25: true - cwe2021-top25: true - subcategory: - - audit - likelihood: LOW - impact: MEDIUM - confidence: LOW - languages: - - generic - paths: - include: - - '*.html' - severity: WARNING - patterns: - - pattern-inside: - - pattern-either: - - pattern: href = '{{...}}' - - pattern: href = "{{...}}" - - pattern: href = {{...}} diff --git a/python/django/security/audit/xss/var-in-script-tag.html b/python/django/security/audit/xss/var-in-script-tag.html deleted file mode 100644 index 8bfb72f8d5..0000000000 --- a/python/django/security/audit/xss/var-in-script-tag.html +++ /dev/null @@ -1,21 +0,0 @@ - - - - - -
- -

{{ this_is_fine }}

-
- - - - - diff --git a/python/django/security/audit/xss/var-in-script-tag.yaml b/python/django/security/audit/xss/var-in-script-tag.yaml deleted file mode 100644 index a56724ba50..0000000000 --- a/python/django/security/audit/xss/var-in-script-tag.yaml +++ /dev/null @@ -1,43 +0,0 @@ -rules: -- id: var-in-script-tag - languages: [generic] - severity: ERROR - message: >- - Detected a template variable used in a script tag. - Although template variables are HTML escaped, HTML - escaping does not always prevent cross-site scripting (XSS) - attacks when used directly in JavaScript. If you need this - data on the rendered page, consider placing it in the HTML - portion (outside of a script tag). Alternatively, use a - JavaScript-specific encoder, such as the one available - in OWASP ESAPI. For Django, you may also consider using - the 'json_script' template tag and retrieving the data in - your script by using the element ID (e.g., `document.getElementById`). - patterns: - - pattern-inside: - - pattern: '{{ ... }}' - - pattern-not-inside: nonce = '...' - - pattern-not-inside: nonce = "..." - paths: - include: - - '*.html' - metadata: - cwe: - - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - owasp: - - A07:2017 - Cross-Site Scripting (XSS) - - A03:2021 - Injection - references: - - https://adamj.eu/tech/2020/02/18/safely-including-data-for-javascript-in-a-django-template/?utm_campaign=Django%2BNewsletter&utm_medium=rss&utm_source=Django_Newsletter_12A - - https://www.veracode.com/blog/secure-development/nodejs-template-engines-why-default-encoders-are-not-enough - - https://github.com/ESAPI/owasp-esapi-js - category: security - technology: - - django - cwe2022-top25: true - cwe2021-top25: true - subcategory: - - audit - likelihood: LOW - impact: MEDIUM - confidence: LOW diff --git a/python/flask/security/xss/audit/template-href-var.html b/python/flask/security/xss/audit/template-href-var.html deleted file mode 100644 index 34adbcf891..0000000000 --- a/python/flask/security/xss/audit/template-href-var.html +++ /dev/null @@ -1,32 +0,0 @@ -

From: {{ from_email }}

-

To: - {% for recipient in recipients %} - {{ recipient }}  - {% endfor %} -

-

Subject: {{subject}}

- -
-
diff --git a/python/flask/security/xss/audit/template-href-var.yaml b/python/flask/security/xss/audit/template-href-var.yaml deleted file mode 100644 index d8d625198f..0000000000 --- a/python/flask/security/xss/audit/template-href-var.yaml +++ /dev/null @@ -1,43 +0,0 @@ -rules: -- id: template-href-var - message: >- - Detected a template variable used in an anchor tag with - the 'href' attribute. This allows a malicious actor to - input the 'javascript:' URI and is subject to cross- - site scripting (XSS) attacks. Use 'url_for()' to safely - generate a URL. You may also consider setting the Content - Security Policy (CSP) header. - metadata: - cwe: - - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - owasp: - - A07:2017 - Cross-Site Scripting (XSS) - - A03:2021 - Injection - references: - - https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss - - https://content-security-policy.com/ - category: security - technology: - - flask - cwe2022-top25: true - cwe2021-top25: true - subcategory: - - audit - likelihood: LOW - impact: MEDIUM - confidence: LOW - languages: - - generic - paths: - include: - - '*.html' - severity: WARNING - patterns: - - pattern-inside: - - pattern-either: - - pattern: href = {{ ... }} - - pattern: href = "{{ ... }}" - - pattern: href = '{{ ... }}' - - pattern-not-inside: href = {{ url_for(...) ... }} - - pattern-not-inside: href = "{{ url_for(...) ... }}" - - pattern-not-inside: href = '{{ url_for(...) ... }}'