You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
141 lines
5.3 KiB
141 lines
5.3 KiB
6 years ago
|
// Copyright 2018 Google Inc.
|
||
|
//
|
||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
// you may not use this file except in compliance with the License.
|
||
|
// You may obtain a copy of the License at
|
||
|
//
|
||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||
|
//
|
||
|
// Unless required by applicable law or agreed to in writing, software
|
||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
// See the License for the specific language governing permissions and
|
||
|
// limitations under the License.
|
||
|
|
||
|
syntax = "proto3";
|
||
|
|
||
|
package google.cloud.websecurityscanner.v1alpha;
|
||
|
|
||
|
import "google/api/annotations.proto";
|
||
|
import "google/cloud/websecurityscanner/v1alpha/finding_addon.proto";
|
||
|
|
||
|
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1alpha;websecurityscanner";
|
||
|
option java_multiple_files = true;
|
||
|
option java_outer_classname = "FindingProto";
|
||
|
option java_package = "com.google.cloud.websecurityscanner.v1alpha";
|
||
|
|
||
|
// A Finding resource represents a vulnerability instance identified during a
|
||
|
// ScanRun.
|
||
|
message Finding {
|
||
|
// Types of Findings.
|
||
|
enum FindingType {
|
||
|
// The invalid finding type.
|
||
|
FINDING_TYPE_UNSPECIFIED = 0;
|
||
|
|
||
|
// A page that was served over HTTPS also resources over HTTP. A
|
||
|
// man-in-the-middle attacker could tamper with the HTTP resource and gain
|
||
|
// full access to the website that loads the resource or to monitor the
|
||
|
// actions taken by the user.
|
||
|
MIXED_CONTENT = 1;
|
||
|
|
||
|
// The version of an included library is known to contain a security issue.
|
||
|
// The scanner checks the version of library in use against a known list of
|
||
|
// vulnerable libraries. False positives are possible if the version
|
||
|
// detection fails or if the library has been manually patched.
|
||
|
OUTDATED_LIBRARY = 2;
|
||
|
|
||
|
// This type of vulnerability occurs when the value of a request parameter
|
||
|
// is reflected at the beginning of the response, for example, in requests
|
||
|
// using JSONP. Under certain circumstances, an attacker may be able to
|
||
|
// supply an alphanumeric-only Flash file in the vulnerable parameter
|
||
|
// causing the browser to execute the Flash file as if it originated on the
|
||
|
// vulnerable server.
|
||
|
ROSETTA_FLASH = 5;
|
||
|
|
||
|
// A cross-site scripting (XSS) bug is found via JavaScript callback. For
|
||
|
// detailed explanations on XSS, see
|
||
|
// https://www.google.com/about/appsecurity/learning/xss/.
|
||
|
XSS_CALLBACK = 3;
|
||
|
|
||
|
// A potential cross-site scripting (XSS) bug due to JavaScript breakage.
|
||
|
// In some circumstances, the application under test might modify the test
|
||
|
// string before it is parsed by the browser. When the browser attempts to
|
||
|
// runs this modified test string, it will likely break and throw a
|
||
|
// JavaScript execution error, thus an injection issue is occurring.
|
||
|
// However, it may not be exploitable. Manual verification is needed to see
|
||
|
// if the test string modifications can be evaded and confirm that the issue
|
||
|
// is in fact an XSS vulnerability. For detailed explanations on XSS, see
|
||
|
// https://www.google.com/about/appsecurity/learning/xss/.
|
||
|
XSS_ERROR = 4;
|
||
|
|
||
|
// An application appears to be transmitting a password field in clear text.
|
||
|
// An attacker can eavesdrop network traffic and sniff the password field.
|
||
|
CLEAR_TEXT_PASSWORD = 6;
|
||
|
}
|
||
|
|
||
|
// Output only.
|
||
|
// The resource name of the Finding. The name follows the format of
|
||
|
// 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'.
|
||
|
// The finding IDs are generated by the system.
|
||
|
string name = 1;
|
||
|
|
||
|
// Output only.
|
||
|
// The type of the Finding.
|
||
|
FindingType finding_type = 2;
|
||
|
|
||
|
// Output only.
|
||
|
// The http method of the request that triggered the vulnerability, in
|
||
|
// uppercase.
|
||
|
string http_method = 3;
|
||
|
|
||
|
// Output only.
|
||
|
// The URL produced by the server-side fuzzer and used in the request that
|
||
|
// triggered the vulnerability.
|
||
|
string fuzzed_url = 4;
|
||
|
|
||
|
// Output only.
|
||
|
// The body of the request that triggered the vulnerability.
|
||
|
string body = 5;
|
||
|
|
||
|
// Output only.
|
||
|
// The description of the vulnerability.
|
||
|
string description = 6;
|
||
|
|
||
|
// Output only.
|
||
|
// The URL containing human-readable payload that user can leverage to
|
||
|
// reproduce the vulnerability.
|
||
|
string reproduction_url = 7;
|
||
|
|
||
|
// Output only.
|
||
|
// If the vulnerability was originated from nested IFrame, the immediate
|
||
|
// parent IFrame is reported.
|
||
|
string frame_url = 8;
|
||
|
|
||
|
// Output only.
|
||
|
// The URL where the browser lands when the vulnerability is detected.
|
||
|
string final_url = 9;
|
||
|
|
||
|
// Output only.
|
||
|
// The tracking ID uniquely identifies a vulnerability instance across
|
||
|
// multiple ScanRuns.
|
||
|
string tracking_id = 10;
|
||
|
|
||
|
// Output only.
|
||
|
// An addon containing information about outdated libraries.
|
||
|
OutdatedLibrary outdated_library = 11;
|
||
|
|
||
|
// Output only.
|
||
|
// An addon containing detailed information regarding any resource causing the
|
||
|
// vulnerability such as JavaScript sources, image, audio files, etc.
|
||
|
ViolatingResource violating_resource = 12;
|
||
|
|
||
|
// Output only.
|
||
|
// An addon containing information about request parameters which were found
|
||
|
// to be vulnerable.
|
||
|
VulnerableParameters vulnerable_parameters = 13;
|
||
|
|
||
|
// Output only.
|
||
|
// An addon containing information reported for an XSS, if any.
|
||
|
Xss xss = 14;
|
||
|
}
|