Skip to content

Commit d1e42de

Browse files
committed
ascanrules: Tiddy up ExternalRedirectScanRule
- CHANGELOG > Add re-ordering note. - ExternalRedirectScanRule > Use an enum for payloads & types. Move some logic to be within the payloads enum for simplicity. Move payload counts per Strength logic to init method and use a simplified case structure. Remove unnecessary comments. - ExternalRedirectScanRuleUnitTest > Remove unnecessary assignments. Use isEmpty vs length greater than zero. Signed-off-by: kingthorin <[email protected]>
1 parent ce3c805 commit d1e42de

File tree

3 files changed

+178
-228
lines changed

3 files changed

+178
-228
lines changed

addOns/ascanrules/CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
1616
- SQL Injection - PostgreSQL
1717
- The Remote OS Command Injection scan rule has been broken into two rules; one feedback based, and one time based (Issue 7341). This includes assigning the time based rule ID 90037.
1818
- For Alerts raised by the SQL Injection scan rules the Attack field values are now simply the payload, not an assembled description.
19-
- Maintenance changes.
19+
- The External Redirect scan rule payload were slightly re-ordered to prioritize HTTPS variants.
2020

2121
### Added
2222
- Rules (as applicable) have been tagged in relation to HIPAA and PCI DSS.

0 commit comments

Comments
 (0)