This documentation is not maintained. Please refer to doc.castsoftware.com/technologies to find the latest updates.
1.5.0-beta2
Note
In this release, a change has been made to trigger a different set of rules during a Security Analyzer analysis than was previously the case: all rules that are now triggered are tagged with "API input" instead of "input" alone. The list of changes can be found in the "Rules" section below. This change will occur when using this release of the JAX-RS extension (or newer), AIP Core >= 8.3.27 and when a Security Analyzer analysis is enabled. As such, your Security Analyzer results may be impacted.
Rules
Rule Id | New Rule | Details |
---|---|---|
8490 | FALSE | For AIP >= 8.3.27, the rule "Avoid SQL injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid SQL injection" previously. |
8540 | FALSE | For AIP >= 8.3.27, the rule "Avoid expression language injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid expression language injection" previously. |
8562 | FALSE | For AIP >= 8.3.27, the rule "Avoid server-side request forgery through API requests" is enabled for input received in REST API exposed, instead of "Avoid server-side request forgery" previously. |
8482 | FALSE | For AIP >= 8.3.27, the rule "Avoid cross-site scripting through API requests" is enabled for input received in REST API exposed, instead of "Avoid cross-site scripting" previously. |
8484 | FALSE | For AIP >= 8.3.27, the rule "Avoid HTTP response splitting through API requests" is enabled for input received in REST API exposed, instead of "Avoid HTTP response splitting" previously. |
8486 | FALSE | For AIP >= 8.3.27, the rule "Avoid resource injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid resource injection" previously. |
8488 | FALSE | For AIP >= 8.3.27, the rule "Avoid resource URL manipulation through API requests" is enabled for input received in REST API exposed, instead of "Avoid resource URL manipulation" previously. |
8492 | FALSE | For AIP >= 8.3.27, the rule "Avoid LDAP injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid LDAP injection" previously. |
8494 | FALSE | For AIP >= 8.3.27, the rule "Avoid OS command injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid OS command injection" previously. |
8496 | FALSE | For AIP >= 8.3.27, the rule "Avoid process control through API requests" is enabled for input received in REST API exposed, instead of "Avoid process control" previously. |
8498 | FALSE | For AIP >= 8.3.27, the rule "Avoid thread injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid thread injection" previously. |
8500 | FALSE | For AIP >= 8.3.27, the rule "Avoid code injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid code injection" previously. |
8502 | FALSE | For AIP >= 8.3.27, the rule "Avoid reflection injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid reflection injection" previously. |
8504 | FALSE | For AIP >= 8.3.27, the rule "Avoid XPath injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid XPath injection" previously. |
8506 | FALSE | For AIP >= 8.3.27, the rule "Avoid file path manipulation through API requests" is enabled for input received in REST API exposed, instead of "Avoid file path manipulation" previously. |
8508 | FALSE | For AIP >= 8.3.27, the rule "Avoid log forging through API requests" is enabled for input received in REST API exposed, instead of "Avoid log forging" previously. |
8510 | FALSE | For AIP >= 8.3.27, the rule "Avoid uncontrolled format string through API requests" is enabled for input received in REST API exposed, instead of "Avoid uncontrolled format" previously. |
8512 | FALSE | For AIP >= 8.3.27, the rule "Avoid mixing trusted and untrusted data in HTTP requests through API requests" is enabled for input received in REST API exposed, instead of "Avoid mixing trusted and untrusted data in HTTP requests" previously. |
8514 | FALSE | For AIP >= 8.3.27, the rule "Avoid NoSQL injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid NoSQL injection" previously. |
8516 | FALSE | For AIP >= 8.3.27, the rule "Avoid URL redirection to untrusted site through API requests" is enabled for input received in REST API exposed, instead of "Avoid URL redirection to untrusted site" previously. |
8522 | FALSE | For AIP >= 8.3.27, the rule "Avoid regular expression injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid regular expression injection" previously. |
8528 | FALSE | For AIP >= 8.3.27, the rule "Avoid deserialization injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid deserialization injection" previously. |
8534 | FALSE | For AIP >= 8.3.27, the rule "Avoid XQuery injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid XQuery injection" previously. |
1.5.0-beta1
Other Updates
Details |
---|
Remove client side analysis (calls to web services through WebTarget). Use the com.castsoftware.java.service extension instead. |