mirror of https://github.com/yandex/gixy
parent
150d9f2a3d
commit
1cbcc2661f
|
@ -14,7 +14,7 @@ add_header Content-Security-Policy "
|
||||||
severity = gixy.severity.LOW
|
severity = gixy.severity.LOW
|
||||||
description = ('Multi-line headers are deprecated (see RFC 7230). '
|
description = ('Multi-line headers are deprecated (see RFC 7230). '
|
||||||
'Some clients never supports them (e.g. IE/Edge).')
|
'Some clients never supports them (e.g. IE/Edge).')
|
||||||
help_url = 'https://github.com/yandex/gixy/blob/master/docs/ru/plugins/addheadermultiline.md'
|
help_url = 'https://github.com/yandex/gixy/blob/master/docs/en/plugins/addheadermultiline.md'
|
||||||
directives = ['add_header', 'more_set_headers']
|
directives = ['add_header', 'more_set_headers']
|
||||||
|
|
||||||
def audit(self, directive):
|
def audit(self, directive):
|
||||||
|
|
|
@ -16,7 +16,7 @@ class add_header_redefinition(Plugin):
|
||||||
severity = gixy.severity.MEDIUM
|
severity = gixy.severity.MEDIUM
|
||||||
description = ('"add_header" replaces ALL parent headers. '
|
description = ('"add_header" replaces ALL parent headers. '
|
||||||
'See documentation: http://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header')
|
'See documentation: http://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header')
|
||||||
help_url = 'https://github.com/yandex/gixy/blob/master/docs/ru/plugins/addheaderredefinition.md'
|
help_url = 'https://github.com/yandex/gixy/blob/master/docs/en/plugins/addheaderredefinition.md'
|
||||||
directives = ['server', 'location', 'if']
|
directives = ['server', 'location', 'if']
|
||||||
options = {'headers': {'x-frame-options',
|
options = {'headers': {'x-frame-options',
|
||||||
'x-content-type-options',
|
'x-content-type-options',
|
||||||
|
|
|
@ -10,7 +10,7 @@ class host_spoofing(Plugin):
|
||||||
summary = 'The proxied Host header may be spoofed.'
|
summary = 'The proxied Host header may be spoofed.'
|
||||||
severity = gixy.severity.MEDIUM
|
severity = gixy.severity.MEDIUM
|
||||||
description = 'In most cases "$host" variable are more appropriate, just use it.'
|
description = 'In most cases "$host" variable are more appropriate, just use it.'
|
||||||
help_url = 'https://github.com/yandex/gixy/blob/master/docs/ru/plugins/hostspoofing.md'
|
help_url = 'https://github.com/yandex/gixy/blob/master/docs/en/plugins/hostspoofing.md'
|
||||||
directives = ['proxy_set_header']
|
directives = ['proxy_set_header']
|
||||||
|
|
||||||
def audit(self, directive):
|
def audit(self, directive):
|
||||||
|
|
|
@ -20,7 +20,7 @@ class http_splitting(Plugin):
|
||||||
summary = 'Possible HTTP-Splitting vulnerability.'
|
summary = 'Possible HTTP-Splitting vulnerability.'
|
||||||
severity = gixy.severity.HIGH
|
severity = gixy.severity.HIGH
|
||||||
description = 'Using variables that can contain "\\n" may lead to http injection.'
|
description = 'Using variables that can contain "\\n" may lead to http injection.'
|
||||||
help_url = 'https://github.com/yandex/gixy/blob/master/docs/ru/plugins/httpsplitting.md'
|
help_url = 'https://github.com/yandex/gixy/blob/master/docs/en/plugins/httpsplitting.md'
|
||||||
directives = ['rewrite', 'return', 'add_header', 'proxy_set_header', 'proxy_pass']
|
directives = ['rewrite', 'return', 'add_header', 'proxy_set_header', 'proxy_pass']
|
||||||
|
|
||||||
def audit(self, directive):
|
def audit(self, directive):
|
||||||
|
|
|
@ -17,7 +17,7 @@ class origins(Plugin):
|
||||||
summary = 'Validation regex for "origin" or "referrer" matches untrusted domain.'
|
summary = 'Validation regex for "origin" or "referrer" matches untrusted domain.'
|
||||||
severity = gixy.severity.MEDIUM
|
severity = gixy.severity.MEDIUM
|
||||||
description = 'Improve the regular expression to match only trusted referrers.'
|
description = 'Improve the regular expression to match only trusted referrers.'
|
||||||
help_url = 'https://github.com/yandex/gixy/blob/master/docs/ru/plugins/origins.md'
|
help_url = 'https://github.com/yandex/gixy/blob/master/docs/en/plugins/origins.md'
|
||||||
directives = ['if']
|
directives = ['if']
|
||||||
options = {
|
options = {
|
||||||
'domains': ['*'],
|
'domains': ['*'],
|
||||||
|
|
|
@ -24,7 +24,7 @@ class ssrf(Plugin):
|
||||||
summary = 'Possible SSRF (Server Side Request Forgery) vulnerability.'
|
summary = 'Possible SSRF (Server Side Request Forgery) vulnerability.'
|
||||||
severity = gixy.severity.HIGH
|
severity = gixy.severity.HIGH
|
||||||
description = 'The configuration may allow attacker to create a arbitrary requests from the vulnerable server.'
|
description = 'The configuration may allow attacker to create a arbitrary requests from the vulnerable server.'
|
||||||
help_url = 'https://github.com/yandex/gixy/blob/master/docs/ru/plugins/ssrf.md'
|
help_url = 'https://github.com/yandex/gixy/blob/master/docs/en/plugins/ssrf.md'
|
||||||
directives = ['proxy_pass']
|
directives = ['proxy_pass']
|
||||||
|
|
||||||
def __init__(self, config):
|
def __init__(self, config):
|
||||||
|
|
|
@ -10,7 +10,7 @@ class valid_referers(Plugin):
|
||||||
summary = 'Used "none" as valid referer.'
|
summary = 'Used "none" as valid referer.'
|
||||||
severity = gixy.severity.HIGH
|
severity = gixy.severity.HIGH
|
||||||
description = 'Never trust undefined referer.'
|
description = 'Never trust undefined referer.'
|
||||||
help_url = 'https://github.com/yandex/gixy/blob/master/docs/ru/plugins/validreferers.md'
|
help_url = 'https://github.com/yandex/gixy/blob/master/docs/en/plugins/validreferers.md'
|
||||||
directives = ['valid_referers']
|
directives = ['valid_referers']
|
||||||
|
|
||||||
def audit(self, directive):
|
def audit(self, directive):
|
||||||
|
|
Loading…
Reference in New Issue