lib/pwn/sast/emoticon.rb in pwn-0.4.505 vs lib/pwn/sast/emoticon.rb in pwn-0.4.507
- old
+ new
@@ -50,11 +50,11 @@
else
str = "1:Result larger than 64KB -> Size: #{str.to_s.length}. Please click the \"Path\" link for more details." if str.to_s.length >= 64_000
hash_line = {
timestamp: Time.now.strftime('%Y-%m-%d %H:%M:%S.%9N %z').to_s,
- test_case: nist_800_53_requirements,
+ security_requirements: security_requirements,
filename: filename_arr.push(git_repo_root_uri: git_repo_root_uri, entry: entry),
line_no_and_contents: '',
raw_content: str,
test_case_filter: test_case_filter
}
@@ -108,14 +108,16 @@
# Used primarily to map NIST 800-53 Revision 4 Security Controls
# https://web.nvd.nist.gov/view/800-53/Rev4/impact?impactName=HIGH
# to PWN Exploit & Static Code Anti-Pattern Matching Modules to
# Determine the level of Testing Coverage w/ PWN.
- public_class_method def self.nist_800_53_requirements
+ public_class_method def self.security_requirements
{
sast_module: self,
section: 'LEAST PRIVILEGE',
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6',
+ cwe_id: '546',
+ cwe_uri: 'https://cwe.mitre.org/data/definitions/546.html'
}
rescue StandardError => e
raise e
end