Skip to content

Commit d9e6907

Browse files
committed
ascanrules: Tiddy up ExternalRedirectScanRule
- CHANGELOG > Add maintenance note. - ExternalRedirectScanRule > Use an enum for payloads & types. Extract a method for payload counts per Stength. Remove unnecessary comments. - ExternalRedirectScanRuleUnitTest > Remove unnecessary assignments. Use isEmpty vs length greater than zero. Signed-off-by: kingthorin <[email protected]>
1 parent ce3c805 commit d9e6907

File tree

3 files changed

+186
-228
lines changed

3 files changed

+186
-228
lines changed

addOns/ascanrules/CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
55

66
## Unreleased
77
### Changed
8-
- Maintenance changes.
98
- Depends on an updated version of the Common Library add-on.
109
- The following scan rules and their alerts have been renamed to clarify that they're time based (Issue 7341).
1110
- SQL Injection - Oracle
@@ -17,6 +16,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
1716
- The Remote OS Command Injection scan rule has been broken into two rules; one feedback based, and one time based (Issue 7341). This includes assigning the time based rule ID 90037.
1817
- For Alerts raised by the SQL Injection scan rules the Attack field values are now simply the payload, not an assembled description.
1918
- Maintenance changes.
19+
- The External Redirect scan rule payload were slightly re-ordered to prioritize HTTPS variants.
2020

2121
### Added
2222
- Rules (as applicable) have been tagged in relation to HIPAA and PCI DSS.

0 commit comments

Comments
 (0)