You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/main/resources/wfc/faults/fault_categories.json
+42Lines changed: 42 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -10,4 +10,46 @@
10
10
"fullDescription" : "A schema, like for example OpenAPI for REST, defines the structures not only of the inputs but also the outputs of the API. If what returned by an API is not conforming to its schema, then it is a clear fault. However, whether the fault is in the API (i.e., it does not conform to the schema) or in the schema itself (i.e., it is underspecified, or having mistakes) is something that cannot be known for sure without debugging the issue.",
11
11
"descriptiveName" : "Received A Response From API That Is Not Valid According To Its Schema",
12
12
"label" : "F101:Received A Response From API That Is Not Valid According To Its Schema"
13
+
}, {
14
+
"code" : 102,
15
+
"testCaseLabel" : "successOnInvalidInputs",
16
+
"fullDescription" : "API inputs might have constraints (e.g., integers in a specific range, and strings matching a given regular expression). Also, they need be to of specific types (e.g., integers, booleans, strings, dates, arrays and objects). If some input data does not satisfy the type on constraints defined in the schema, then the API should mark the request as 'user error'. However, if for any reason the request is processed successfully, then it is a fault. Either the schema is incorrect, or the API is not properly discarding invalid data.",
17
+
"descriptiveName" : "Received Success Response When Sending Wrong Data",
18
+
"label" : "F102:Received Success Response When Sending Wrong Data"
19
+
}, {
20
+
"code" : 103,
21
+
"testCaseLabel" : "deleteNotWorking",
22
+
"fullDescription" : "If a resource is deleted, and the API responds that such request was successful, then such resource should no longer being available. New requests to access it should fail. Otherwise, if it is still possible to access the resource, then it was not really deleted. Then, as such, it means that the delete operation is faulty.",
23
+
"descriptiveName" : "Resource Still Accessible After Being Deleted",
24
+
"label" : "F103:Resource Still Accessible After Being Deleted"
25
+
}, {
26
+
"code" : 104,
27
+
"testCaseLabel" : "sideEffectsOnFailedCreation",
28
+
"fullDescription" : "The API might expose endpoints to create new resources. The creation of a new resource might fail due to non-satisfied input constraints, or based on constraints in the state of the backend. If the API reports that the creation operation failed, then such action should have no side-effects The resource (e.g., with partial data) should not be accessible.",
29
+
"descriptiveName" : "Failed Creation of Resource Has Side Effects on Backend",
30
+
"label" : "F104:Failed Creation of Resource Has Side Effects on Backend"
31
+
}, {
32
+
"code" : 200,
33
+
"testCaseLabel" : "vulnerableToSQLInjection",
34
+
"fullDescription" : "Input data was not properly sanitized. Its use in SQL commands led to execute arbitrary commands on the database. See OWASP Top 10 for more information.",
35
+
"descriptiveName" : "SQL Injection (SQLi)",
36
+
"label" : "F200:SQL Injection (SQLi)"
37
+
}, {
38
+
"code" : 201,
39
+
"testCaseLabel" : "vulnerableToXSS",
40
+
"fullDescription" : "XSS is an attack in which it is possible to inject malicious scripts into web pages viewed users. This works as well in APIs, if the malicious payload is stored as it is, and then read afterwards by a frontend web application. See OWASP Top 10 for more information.",
41
+
"descriptiveName" : "Cross-Site Scripting (XSS)",
42
+
"label" : "F201:Cross-Site Scripting (XSS)"
43
+
}, {
44
+
"code" : 202,
45
+
"testCaseLabel" : "vulnerableToSSRF",
46
+
"fullDescription" : "Some inputs might be URLs, which are then used by the API to retrieve data from external services. However, if the hostnames of these URLs are not verified, the API could be tricked into making requests towards servers it should not to, like for example the 'localhost'. See OWASP Top 10 for more information.",
"fullDescription" : "This vulnerability exploits possible active record pattern misconfigurations to modify fields of a record that should not be accessible via the API. See OWASP Top 10 for more information.",
0 commit comments