Done
Pinned fields
Click on the next to a field label to start pinning.
Details
Assignee
Yassin KammounYassin KammounReporter
Yassin KammounYassin KammounFix versions
Priority
Normal
Details
Details
Assignee
Yassin Kammoun
Yassin KammounReporter
Yassin Kammoun
Yassin KammounFix versions
Priority

Sentry
Sentry
Sentry
Created May 22, 2024 at 8:38 AM
Updated October 16, 2024 at 12:53 PM
Resolved June 5, 2024 at 1:31 PM
While discovering a bug in Whistle, an HTTP debugging proxy, the vulnerability researchers from the R&D Team reported that the rule S5122 is not detecting this vulnerability. However, the rule description shows a noncompliant code example that is similar to the found vulnerability (see user-controlled origin subsection). It seems that the RSPEC was updated some time ago but the rule implementation was not.
The purpose of this ticket is to update the rule implementation to detect the vulnerability. The improvement should make sure of the following:
The rule should detect the vulnerability in the code snippet of the RSPEC.
The rule should detect the vulnerability in the reproducer provided by the vulnerability researchers.
The rule should detect the vulnerability in the original codebase where the vulnerability was found.
Vulnerability in Whistle’s codebase
The suggested code fix in the RSPEC seems too specific to kill the noise. When tackling the implementation, one might want to ask the AppSec Squad if there are more code patterns validating the origin the rule should consider.
Original Discuss report from the R&D Team