Skip to content

Commit

Permalink
Fix typo
Browse files Browse the repository at this point in the history
  • Loading branch information
Yevhen Zavhorodnii committed May 23, 2024
1 parent b666d29 commit 6a76faf
Show file tree
Hide file tree
Showing 4 changed files with 6 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ func (*CrossSiteRequestForgeryRule) Category() *types.RiskCategory {
STRIDE: types.Spoofing,
DetectionLogic: "In-scope web applications accessed via typical web access protocols.",
RiskAssessment: "The risk rating depends on the integrity rating of the data sent across the communication link.",
FalsePositives: "Web applications passing the authentication sate via custom headers instead of cookies can " +
FalsePositives: "Web applications passing the authentication state via custom headers instead of cookies can " +
"eventually be false positives. Also when the web application " +
"is not accessed via a browser-like component (i.e not by a human user initiating the request that " +
"gets passed through all components until it reaches the web application) this can be considered a false positive.",
Expand Down
4 changes: 2 additions & 2 deletions test/all.json
Original file line number Diff line number Diff line change
Expand Up @@ -1151,7 +1151,7 @@
"check": "Are recommendations from the linked cheat sheet and referenced ASVS chapter applied?",
"detection_logic": "In-scope web applications accessed via typical web access protocols.",
"risk_assessment": "The risk rating depends on the integrity rating of the data sent across the communication link.",
"false_positives": "Web applications passing the authentication sate via custom headers instead of cookies can eventually be false positives. Also when the web application is not accessed via a browser-like component (i.e not by a human user initiating the request that gets passed through all components until it reaches the web application) this can be considered a false positive.",
"false_positives": "Web applications passing the authentication state via custom headers instead of cookies can eventually be false positives. Also when the web application is not accessed via a browser-like component (i.e not by a human user initiating the request that gets passed through all components until it reaches the web application) this can be considered a false positive.",
"function": "development",
"cwe": 352
},
Expand Down Expand Up @@ -2805,4 +2805,4 @@
}
]
}
}
}
4 changes: 2 additions & 2 deletions test/parsed-model.json
Original file line number Diff line number Diff line change
Expand Up @@ -1831,7 +1831,7 @@
"function": "development",
"detection_logic": "In-scope web applications accessed via typical web access protocols.",
"risk_assessment": "The risk rating depends on the integrity rating of the data sent across the communication link.",
"false_positives": "Web applications passing the authentication sate via custom headers instead of cookies can eventually be false positives. Also when the web application is not accessed via a browser-like component (i.e not by a human user initiating the request that gets passed through all components until it reaches the web application) this can be considered a false positive.",
"false_positives": "Web applications passing the authentication state via custom headers instead of cookies can eventually be false positives. Also when the web application is not accessed via a browser-like component (i.e not by a human user initiating the request that gets passed through all components until it reaches the web application) this can be considered a false positive.",
"cwe": 352
},
{
Expand Down Expand Up @@ -3055,4 +3055,4 @@
}
]
}
}
}
2 changes: 1 addition & 1 deletion test/parsed-model.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1531,7 +1531,7 @@ built_in_risk_categories:
function: development
detection_logic: In-scope web applications accessed via typical web access protocols.
risk_assessment: The risk rating depends on the integrity rating of the data sent across the communication link.
false_positives: Web applications passing the authentication sate via custom headers instead of cookies can eventually be false positives. Also when the web application is not accessed via a browser-like component (i.e not by a human user initiating the request that gets passed through all components until it reaches the web application) this can be considered a false positive.
false_positives: Web applications passing the authentication state via custom headers instead of cookies can eventually be false positives. Also when the web application is not accessed via a browser-like component (i.e not by a human user initiating the request that gets passed through all components until it reaches the web application) this can be considered a false positive.
cwe: 352
- id: missing-identity-provider-isolation
title: Missing Identity Provider Isolation
Expand Down

0 comments on commit 6a76faf

Please sign in to comment.