kics icon indicating copy to clipboard operation
kics copied to clipboard

fix(query): added case handling for "destination_port_ranges" field for rdp/ssh_is_exposed_to_the_internet -- terraform/azure

Open cx-andre-pereira opened this issue 3 months ago • 2 comments

Reason for Proposed Changes

Proposed Changes

  • Updated the queries results and auxiliary functions to properly detect and handle the two relevant fields.
  • Added positive2/negative2 test files to both queries that contain samples relying on the "destination_port_ranges" field. The original test files now named positive1/negative1 will keep all samples that use the simple "destination_port_range" field.
  • This changes should prevent valid False Negative results when the samples provided rely on the newly supported field.
  • Added support for "Udp" protocol to the "rdp_is_exposed_to_the_internet" query since RDP8.0+ allows so; tests were adjusted/added accordingly.

I submit this contribution under the Apache-2.0 license.

cx-andre-pereira avatar Aug 28 '25 12:08 cx-andre-pereira

kics-logo

KICS version: v2.1.13

Category Results
CRITICAL CRITICAL 0
HIGH HIGH 0
MEDIUM MEDIUM 0
LOW LOW 0
INFO INFO 0
TRACE TRACE 0
TOTAL TOTAL 0
Metric Values
Files scanned placeholder 1
Files parsed placeholder 1
Files failed to scan placeholder 0
Total executed queries placeholder 47
Queries failed to execute placeholder 0
Execution time placeholder 0

github-actions[bot] avatar Aug 28 '25 12:08 github-actions[bot]

⚠️ GitGuardian has uncovered 2 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
21271469 Triggered Generic Password a0baa6e33065485175b27568edb9dc4dd3ce1431 assets/queries/terraform/azure/unrestricted_sql_server_access/test/negative5.tf View secret
20838717 Triggered Generic Password ee027eb243c15b979241b083c7fae99c38da3c57 assets/queries/azureResourceManager/sql_server_database_with_alerts_disabled/test/negative8.bicep View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

gitguardian[bot] avatar Sep 19 '25 13:09 gitguardian[bot]