Skip to content

Commit d122534

Browse files
authored
Merge pull request #20671 from github/napalys/adjust_query_severity
Adjust query severity ratings
2 parents 8624f9c + 9c70ae0 commit d122534

File tree

10 files changed

+24
-6
lines changed

10 files changed

+24
-6
lines changed

java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id java/overly-large-range
1010
* @tags correctness

java/ql/src/Security/CWE/CWE-614/InsecureCookie.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* interception.
55
* @kind problem
66
* @problem.severity error
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id java/insecure-cookie
1010
* @tags security
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
---
2+
category: queryMetadata
3+
---
4+
* Reduced the `security-severity` score of the `java/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.
5+
* Reduced the `security-severity` score of the `java/insecure-cookie` query from 5.0 to 4.0 to better reflect its impact.

javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id js/overly-large-range
1010
* @tags correctness

javascript/ql/src/Security/CWE-079/XssThroughDom.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* can lead to a cross-site scripting vulnerability.
55
* @kind path-problem
66
* @problem.severity warning
7-
* @security-severity 6.1
7+
* @security-severity 7.8
88
* @precision high
99
* @id js/xss-through-dom
1010
* @tags security
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
---
2+
category: queryMetadata
3+
---
4+
* Increased the `security-severity` score of the `js/xss-through-dom` query from 6.1 to 7.8 to align with other XSS queries.
5+
* Reduced the `security-severity` score of the `js/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.

python/ql/src/Security/CWE-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id py/overly-large-range
1010
* @tags correctness
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
---
2+
category: queryMetadata
3+
---
4+
* Reduced the `security-severity` score of the `py/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
---
2+
category: queryMetadata
3+
---
4+
* Reduced the `security-severity` score of the `rb/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.

ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id rb/overly-large-range
1010
* @tags correctness

0 commit comments

Comments
 (0)