RulesDescriptionExampleKPIconfig__rules__severity
Command InjectionCommand injection occurs when shell commands unsafely include user-manipulatable values.Securitycritical
Cross-Site Request ForgeryCSRF allows an attacker to perform actions on a website as if they are an authenticated user.Securitycritical
Cross Site ScriptingXSS occurs when a user-manipulatable value is displayed on a web page without escaping it, allowing someone to inject Javascript or HTML into the page.Securitycritical
Cross Site Scripting (Content Tag)Content Tag is a view helper which generates an HTML tag with some contentSecuritycritical
Cross Site Scripting (JSON)XSS occurs when a user-manipulatable value is displayed on a web page without escaping it, allowing someone to inject Javascript or HTML into the page.Securitycritical
Dangerous EvaluationUser input in an eval statement is VERY dangerousSecuritycritical
Dangerous SendUsing unfiltered user data to select a Class or Method to be dynamically sent is dangerous.Securitycritical
Denial of ServiceDenial of Service (DoS) is any attack which causes a service to become unavailable for legitimate clients.Securitycritical
Divide By ZeroFinds potential division by zero with integers. Dividing a float by zero or 0.0 in Ruby results in Infinity, not an exception.Securitycritical
Dynamic Render PathsWhen a call to render uses a dynamically generated path, template name, file name, or action, there is the possibility that a user can access templates that should be restricted. The issue may be worse if those templates execute code or modify the database.Securitycritical
File AccessVulnerability can be used to access arbitrary files on a server (including /etc/passwd.Securitycritical
Information DisclosureVulnerability refers to system or internal information (such as debugging output, stack traces, error messages, etc.)Securitycritical
Remote Code ExecutionUses of send, constantize, and other methods which allow creation of arbitrary objects or calling of arbitrary methods.Securitycritical
SQL InjectionSQL injection is when a user is able to manipulate a value which is used unsafely inside a SQL query. This can lead to data leaks, data loss, elevation of privilege, and other unpleasant outcomes.Securitycritical
SSL Verification BypassThese attacks rely on the client to establish a connection that doesn’t check the validity of the SSL certificate presented by the server.Securitycritical
Unsafe DeserializationThe YAML, JSON, and CSV libraries also have methods for dumping Ruby objects into strings, and then creating objects from those strings.Securitycritical
Unsafe RedirectsUser-supplied values can be used to “spoof” websites or hide malicious links in otherwise harmless-looking URLs. They can also allow access to restricted areas of a site if the destination is not validated.Securitycritical