finding.proto 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152
  1. // Copyright 2019 Google LLC.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. //
  15. syntax = "proto3";
  16. package google.cloud.websecurityscanner.v1alpha;
  17. import "google/api/resource.proto";
  18. import "google/cloud/websecurityscanner/v1alpha/finding_addon.proto";
  19. option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1alpha;websecurityscanner";
  20. option java_multiple_files = true;
  21. option java_outer_classname = "FindingProto";
  22. option java_package = "com.google.cloud.websecurityscanner.v1alpha";
  23. // A Finding resource represents a vulnerability instance identified during a
  24. // ScanRun.
  25. message Finding {
  26. option (google.api.resource) = {
  27. type: "websecurityscanner.googleapis.com/Finding"
  28. pattern: "projects/{project}/scanConfigs/{scan_config}/scanRuns/{scan_run}/findings/{finding}"
  29. };
  30. // Types of Findings.
  31. enum FindingType {
  32. // The invalid finding type.
  33. FINDING_TYPE_UNSPECIFIED = 0;
  34. // A page that was served over HTTPS also resources over HTTP. A
  35. // man-in-the-middle attacker could tamper with the HTTP resource and gain
  36. // full access to the website that loads the resource or to monitor the
  37. // actions taken by the user.
  38. MIXED_CONTENT = 1;
  39. // The version of an included library is known to contain a security issue.
  40. // The scanner checks the version of library in use against a known list of
  41. // vulnerable libraries. False positives are possible if the version
  42. // detection fails or if the library has been manually patched.
  43. OUTDATED_LIBRARY = 2;
  44. // This type of vulnerability occurs when the value of a request parameter
  45. // is reflected at the beginning of the response, for example, in requests
  46. // using JSONP. Under certain circumstances, an attacker may be able to
  47. // supply an alphanumeric-only Flash file in the vulnerable parameter
  48. // causing the browser to execute the Flash file as if it originated on the
  49. // vulnerable server.
  50. ROSETTA_FLASH = 5;
  51. // A cross-site scripting (XSS) bug is found via JavaScript callback. For
  52. // detailed explanations on XSS, see
  53. // https://www.google.com/about/appsecurity/learning/xss/.
  54. XSS_CALLBACK = 3;
  55. // A potential cross-site scripting (XSS) bug due to JavaScript breakage.
  56. // In some circumstances, the application under test might modify the test
  57. // string before it is parsed by the browser. When the browser attempts to
  58. // runs this modified test string, it will likely break and throw a
  59. // JavaScript execution error, thus an injection issue is occurring.
  60. // However, it may not be exploitable. Manual verification is needed to see
  61. // if the test string modifications can be evaded and confirm that the issue
  62. // is in fact an XSS vulnerability. For detailed explanations on XSS, see
  63. // https://www.google.com/about/appsecurity/learning/xss/.
  64. XSS_ERROR = 4;
  65. // An application appears to be transmitting a password field in clear text.
  66. // An attacker can eavesdrop network traffic and sniff the password field.
  67. CLEAR_TEXT_PASSWORD = 6;
  68. // An application returns sensitive content with an invalid content type,
  69. // or without an 'X-Content-Type-Options: nosniff' header.
  70. INVALID_CONTENT_TYPE = 7;
  71. // A cross-site scripting (XSS) vulnerability in AngularJS module that
  72. // occurs when a user-provided string is interpolated by Angular.
  73. XSS_ANGULAR_CALLBACK = 8;
  74. // A malformed or invalid valued header.
  75. INVALID_HEADER = 9;
  76. // Misspelled security header name.
  77. MISSPELLED_SECURITY_HEADER_NAME = 10;
  78. // Mismatching values in a duplicate security header.
  79. MISMATCHING_SECURITY_HEADER_VALUES = 11;
  80. }
  81. // The resource name of the Finding. The name follows the format of
  82. // 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'.
  83. // The finding IDs are generated by the system.
  84. string name = 1;
  85. // The type of the Finding.
  86. FindingType finding_type = 2;
  87. // The http method of the request that triggered the vulnerability, in
  88. // uppercase.
  89. string http_method = 3;
  90. // The URL produced by the server-side fuzzer and used in the request that
  91. // triggered the vulnerability.
  92. string fuzzed_url = 4;
  93. // The body of the request that triggered the vulnerability.
  94. string body = 5;
  95. // The description of the vulnerability.
  96. string description = 6;
  97. // The URL containing human-readable payload that user can leverage to
  98. // reproduce the vulnerability.
  99. string reproduction_url = 7;
  100. // If the vulnerability was originated from nested IFrame, the immediate
  101. // parent IFrame is reported.
  102. string frame_url = 8;
  103. // The URL where the browser lands when the vulnerability is detected.
  104. string final_url = 9;
  105. // The tracking ID uniquely identifies a vulnerability instance across
  106. // multiple ScanRuns.
  107. string tracking_id = 10;
  108. // An addon containing information about outdated libraries.
  109. OutdatedLibrary outdated_library = 11;
  110. // An addon containing detailed information regarding any resource causing the
  111. // vulnerability such as JavaScript sources, image, audio files, etc.
  112. ViolatingResource violating_resource = 12;
  113. // An addon containing information about vulnerable or missing HTTP headers.
  114. VulnerableHeaders vulnerable_headers = 15;
  115. // An addon containing information about request parameters which were found
  116. // to be vulnerable.
  117. VulnerableParameters vulnerable_parameters = 13;
  118. // An addon containing information reported for an XSS, if any.
  119. Xss xss = 14;
  120. }