forked from trailofbits/semgrep-rules
-
Notifications
You must be signed in to change notification settings - Fork 0
/
v3-cors-audit.yaml
44 lines (43 loc) · 1.67 KB
/
v3-cors-audit.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
rules:
# Rule for potentially bad CORS policies in the batteries-included apollo-server
- id: v3-potentially-bad-cors
languages: [js, ts]
message: >-
The Apollo GraphQL server is setup with a CORS policy that does not deny all origins. Carefully review the origins to see if any of them are incorrectly setup (third-party websites, bad regexes, functions that reflect every origin, etc.).
severity: WARNING
metadata:
category: security
cwe: "CWE-942: Permissive Cross-domain Policy with Untrusted Domains"
subcategory: [audit]
confidence: LOW
likelihood: MEDIUM
impact: MEDIUM
technology:
- graphql
- apollo-graphql-server
- apollo-graphql-server-v3
description: "Potentially bad CORS policy"
references:
- https://www.apollographql.com/docs/apollo-server/v3/security/cors#configuring-cors-options-for-apollo-server
mode: taint
pattern-sources:
# Remove this once the above matches functions (https://github.com/returntocorp/semgrep/issues/6748)
- pattern: |
{ origin: function(...) {...} }
- patterns:
- pattern-inside: |
{ origin: $NOT_KNOWN_GOOD_CORS_ORIGIN }
- metavariable-pattern:
metavariable: $NOT_KNOWN_GOOD_CORS_ORIGIN
patterns:
# 'false' denies every origin
- pattern-not: |
false
# An empty array denies every origin.
- pattern-not: |
[]
pattern-sinks:
- patterns:
- pattern: |
{..., cors: $CORS_ORIGIN, ...}
- focus-metavariable: $CORS_ORIGIN