UNPKG

eslint-plugin-sonarjs

Version:
93 lines (92 loc) 3.88 kB
"use strict"; /* * SonarQube JavaScript Plugin * Copyright (C) 2011-2025 SonarSource SA * mailto:info AT sonarsource DOT com * * This program is free software; you can redistribute it and/or * modify it under the terms of the Sonar Source-Available License Version 1, as published by SonarSource SA. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. * See the Sonar Source-Available License for more details. * * You should have received a copy of the Sonar Source-Available License * along with this program; if not, see https://sonarsource.com/license/ssal/ */ // https://sonarsource.github.io/rspec/#/rspec/S6317/javascript Object.defineProperty(exports, "__esModule", { value: true }); exports.rule = void 0; const index_js_1 = require("../helpers/index.js"); const result_js_1 = require("../helpers/result.js"); const iam_js_1 = require("../helpers/aws/iam.js"); const meta_js_1 = require("./meta.js"); const SENSITIVE_RESOURCE = /^(\*|arn:[^:]*:[^:]*:[^:]*:[^:]*:(role|user|group)\/\*)$/; const SENSITIVE_ACTIONS = [ 'cloudformation:CreateStack', 'datapipeline:CreatePipeline', 'datapipeline:PutPipelineDefinition', 'ec2:RunInstances', 'glue:CreateDevEndpoint', 'glue:UpdateDevEndpoint', 'iam:AddUserToGroup', 'iam:AttachGroupPolicy', 'iam:AttachRolePolicy', 'iam:AttachUserPolicy', 'iam:CreateAccessKey', 'iam:CreateLoginProfile', 'iam:CreatePolicyVersion', 'iam:PassRole', 'iam:PutGroupPolicy', 'iam:PutRolePolicy', 'iam:PutUserPolicy', 'iam:SetDefaultPolicyVersion', 'iam:UpdateAssumeRolePolicy', 'iam:UpdateLoginProfile', 'lambda:AddPermission', 'lambda:CreateEventSourceMapping', 'lambda:CreateFunction', 'lambda:InvokeFunction', 'lambda:UpdateFunctionCode', 'sts:AssumeRole', ]; const MESSAGES = { message: (attackVectorName) => `This policy is vulnerable to the "${attackVectorName}" privilege escalation vector. ` + 'Remove permissions or restrict the set of resources they apply to.', secondary: 'Permissions are granted on all resources.', }; exports.rule = (0, iam_js_1.AwsIamPolicyTemplate)(privilegeEscalationStatementChecker, (0, index_js_1.generateMeta)(meta_js_1.meta, undefined, true)); function privilegeEscalationStatementChecker(expr, ctx, options) { const properties = (0, result_js_1.getResultOfExpression)(ctx, expr); const effect = (0, iam_js_1.getSensitiveEffect)(properties, ctx, options); const resource = getSensitiveResource(properties, options); const action = getSensitiveAction(properties, options); if (!hasExceptionProperties(properties, options) && (effect.isFound || effect.isMissing) && resource && action) { (0, index_js_1.report)(ctx, { message: MESSAGES.message(action.value), node: resource, }, [(0, index_js_1.toSecondaryLocation)(action, MESSAGES.secondary)]); } } function getSensitiveAction(properties, options) { const actions = properties.getProperty(options.actions.property); return actions.asStringLiterals().find(isSensitiveAction); } function getSensitiveResource(properties, options) { const resources = properties.getProperty(options.resources.property); return resources.asStringLiterals().find(isSensitiveResource); } function isSensitiveAction(action) { return SENSITIVE_ACTIONS.includes(action.value); } function isSensitiveResource(resource) { return SENSITIVE_RESOURCE.test(resource.value); } function hasExceptionProperties(properties, options) { const exceptionProperties = [options.principals.property, options.conditions.property]; return exceptionProperties.some(prop => !properties.getProperty(prop).isMissing); }