Rule | Description | KPI | url |
---|---|---|---|
ANDROID_BROADCAST | Broadcast intents can be listen by any application with the appropriate permission. It is suggested to avoid transmitting sensitive information when possible. | Security | https://find-sec-bugs.github.io/bugs.htm#ANDROID_BROADCAST |
ANDROID_EXTERNAL_FILE_ACCESS | The application write data to external storage (potentially SD card). There are multiple security implication to this action. First, file store on SD card will be accessible to the application having the READ_EXTERNAL_STORAGE permission. Also, if the data persisted contains confidential information about the user, encryption would be needed. | Security | https://find-sec-bugs.github.io/bugs.htm#ANDROID_EXTERNAL_FILE_ACCESS |
ANDROID_GEOLOCATION | It is suggested to ask the user for a confirmation about obtaining its geolocation. | Security | https://find-sec-bugs.github.io/bugs.htm#ANDROID_GEOLOCATION |
ANDROID_WEB_VIEW_JAVASCRIPT | Enabling JavaScript for the WebView means that it is now susceptible to XSS. The page render should be inspected for potential reflected XSS, stored XSS and DOM XSS.
WebView myWebView = (WebView) findViewById(R.id.webView); |
Security | https://find-sec-bugs.github.io/bugs.htm#ANDROID_WEB_VIEW_JAVASCRIPT |
ANDROID_WEB_VIEW_JAVASCRIPT_INTERFACE | The use of JavaScript Interface could expose the WebView to risky API. If an XSS is triggered in the WebView, the class could be called by the malicious JavaScript code. | Security | https://find-sec-bugs.github.io/bugs.htm#ANDROID_WEB_VIEW_JAVASCRIPT_INTERFACE |
ANDROID_WORLD_WRITABLE | The file written in this context is using the creation mode MODE_WORLD_READABLE. It might not be the expected behavior to exposed the content being written. | Security | https://find-sec-bugs.github.io/bugs.htm#ANDROID_WORLD_WRITABLE |
AWS_QUERY_INJECTION | Constructing SimpleDB queries containing user input can allow an attacker to view unauthorized records. The following example dynamically constructs and executes a SimpleDB select() query allowing the user to specify the productCategory. The attacker can modify the query, bypass the required authentication for customerID and view records matching any customer. | Security | https://find-sec-bugs.github.io/bugs.htm#AWS_QUERY_INJECTION |
BAD_HEXA_CONVERSION | When converting a byte array containing a hash signature to a human readable string, a conversion mistake can be made if the array is read byte by byte. The following sample illustrates the use of Integer.toHexString() which will trim any leading zeroes from each byte of the computed hash value. | Security | https://find-sec-bugs.github.io/bugs.htm#BAD_HEXA_CONVERSION |
BEAN_PROPERTY_INJECTION | An attacker can set arbitrary bean properties that can compromise system integrity. Bean population functions allow to set a bean property or a nested property. An attacker can leverage this functionality to access special bean properties like class.classLoader that will allow him to override system properties and potentially execute arbitrary code. | Security | https://find-sec-bugs.github.io/bugs.htm#BEAN_PROPERTY_INJECTION |
BLOWFISH_KEY_SIZE | The Blowfish cipher supports keysizes from 32 bits to 448 bits. A small key size makes the ciphertext vulnerable to brute force attacks. At least 128 bits of entropy should be used when generating the key if use of Blowfish is required. If the algorithm can be changed, the AES block cipher should be used instead. | Security | https://find-sec-bugs.github.io/bugs.htm#BLOWFISH_KEY_SIZE |
CIPHER_INTEGRITY | The ciphertext produced is susceptible to alteration by an adversary. This mean that the cipher provides no way to detect that the data has been tampered with. If the ciphertext can be controlled by an attacker, it could be altered without detection. The solution is to used a cipher that includes a Hash based Message Authentication Code (HMAC) to sign the data. Combining a HMAC function to the existing cipher is prone to error [1]. Specifically, it is always recommended that you be able to verify the HMAC first, and only if the data is unmodified, do you then perform any cryptographic functions on the data. The following modes are vulnerable because they don’t provide a HMAC: – CBC – OFB – CTR – ECB The following snippets code are some examples of vulnerable code. | Security | https://find-sec-bugs.github.io/bugs.htm#CIPHER_INTEGRITY |
COMMAND_INJECTION | The highlighted API is used to execute a system command. If unfiltered input is passed to this API, it can lead to arbitrary command execution. | Security | https://find-sec-bugs.github.io/bugs.htm#COMMAND_INJECTION |
COOKIE_PERSISTENT | Storing sensitive data in a persistent cookie for an extended period of time can lead to a breach of confidentiality or account compromise. Explanation: If private information is stored in persistent cookies, attackers have a larger time window in which to steal this data – especially since persistent cookies are often set to expire in the distant future. Persistent cookies are generally stored in a text file on the client and an attacker with access to the victim’s machine can steal this information. Persistent cookies are often used to profile users as they interact with a site. Depending on what is done with this tracking data, it is possible to use persistent cookies to violate users’ privacy. | Security | https://find-sec-bugs.github.io/bugs.htm#COOKIE_PERSISTENT |
COOKIE_USAGE | The information stored in a custom cookie should not be sensitive or related to the session. In most cases, sensitive data should only be stored in session and referenced by the user’s session cookie. See HttpSession (HttpServletRequest.getSession()) Custom cookies can be used for information that needs to live longer than and is independent of a specific session. | Security | https://find-sec-bugs.github.io/bugs.htm#COOKIE_USAGE |
CRLF_INJECTION_LOGS | When data from an untrusted source is put into a logger and not neutralized correctly, an attacker could forge log entries or include malicious content. Inserted false entries could be used to skew statistics, distract the administrator or even to implicate another party in the commission of a malicious act. If the log file is processed automatically, the attacker can render the file unusable by corrupting the format of the file or injecting unexpected characters. An attacker may also inject code or other commands into the log file and take advantage of a vulnerability in the log processing utility (e.g. command injection or XSS). | Security | https://find-sec-bugs.github.io/bugs.htm#CRLF_INJECTION_LOGS |
CUSTOM_INJECTION | The method identified is susceptible to injection. The input should be validated and properly escaped. | Security | https://find-sec-bugs.github.io/bugs.htm#CUSTOM_INJECTION |
CUSTOM_MESSAGE_DIGEST | Implementing a custom MessageDigest is error-prone.
NIST recommends the use of SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, or SHA-512/256. |
Security | https://find-sec-bugs.github.io/bugs.htm#CUSTOM_MESSAGE_DIGEST |
DEFAULT_HTTP_CLIENT | Security | https://find-sec-bugs.github.io/bugs.htm#DEFAULT_HTTP_CLIENT | |
DES_USAGE | DES is considered strong ciphers for modern applications. Currently, NIST recommends the usage of AES block ciphers instead of DES. | Security | https://find-sec-bugs.github.io/bugs.htm#DES_USAGE |
DESERIALIZATION_GADGET | Deserialization gadget are class that could be used by an attacker to take advantage of a remote API using Native Serialization. This class is either adding custom behavior to deserialization with the readObject method (Serializable) or can be called from a serialized object (InvocationHandler). This detector is intended to be used mostly by researcher. The real issue is using deserialization for remote operation. Removing gadget is an hardening practice to reduce the risk of being exploited. | Security | https://find-sec-bugs.github.io/bugs.htm#DESERIALIZATION_GADGET |
ECB_MODE | An authentication cipher mode which provides better confidentiality of the encrypted data should be used instead of Electronic Codebook (ECB) mode, which does not provide good confidentiality. Specifically, ECB mode produces the same output for the same input each time. So, for example, if a user is sending a password, the encrypted value is the same each time. This allows an attacker to intercept and replay the data. To fix this, something like Galois/Counter Mode (GCM) should be used instead. | Security | https://find-sec-bugs.github.io/bugs.htm#ECB_MODE |
EL_INJECTION | A expression is built with a dynamic value. The source of the value(s) should be verified to avoid that unfiltered values fall into this risky code evaluation. | Security | https://find-sec-bugs.github.io/bugs.htm#EL_INJECTION |
ESAPI_ENCRYPTOR | The ESAPI has a small history of vulnerabilities within the cryptography component. Here is a quick validation list to make sure the Authenticated Encryption is working as expected. | Security | https://find-sec-bugs.github.io/bugs.htm#ESAPI_ENCRYPTOR |
EXTERNAL_CONFIG_CONTROL | Allowing external control of system settings can disrupt service or cause an application to behave in unexpected, and potentially malicious ways. An attacker could cause an error by providing a nonexistent catalog name or connect to an unauthorized portion of the database. | Security | https://find-sec-bugs.github.io/bugs.htm#EXTERNAL_CONFIG_CONTROL |
FILE_UPLOAD_FILENAME | The filename provided by the FileUpload API can be tampered with by the client to reference unauthorized files.
Therefore, such values should not be passed directly to the filesystem API. If acceptable, the application should generate its own file names and use those. Otherwise, the provided filename should be properly validated to ensure it’s properly structured, contains no unauthorized path characters (e.g., / ), and refers to an authorized file. |
Security | https://find-sec-bugs.github.io/bugs.htm#FILE_UPLOAD_FILENAME |
FORMAT_STRING_MANIPULATION | Allowing user input to control format parameters could enable an attacker to cause exceptions to be thrown or leak information. Attackers may be able to modify the format string argument, such that an exception is thrown. If this exception is left uncaught, it may crash the application. Alternatively, if sensitive information is used within the unused arguments, attackers may change the format string to reveal this information. The example code below lets the user specify the decimal points to which it shows the balance. The user can in fact specify anything causing an exception to be thrown which could lead to application failure. Even more critical within this example, if an attacker can specify the user input “2f %3$s %4$.2”, the format string would be “The customer: %s %s has the balance %4$.2f %3$s %4$.2”. This would then lead to the sensitive accountNo to be included within the resulting string. | Security | https://find-sec-bugs.github.io/bugs.htm#FORMAT_STRING_MANIPULATION |
HARD_CODE_KEY | Cryptographic keys should not be kept in the source code. The source code can be widely shared in an enterprise environment, and is certainly shared in open source. To be managed safely, passwords and secret keys should be stored in separate configuration files or keystores. (Hard coded passwords are reported separately by Hard Coded Password pattern). | Security | https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_KEY |
HARD_CODE_PASSWORD | Passwords should not be kept in the source code. The source code can be widely shared in an enterprise environment, and is certainly shared in open source. To be managed safely, passwords and secret keys should be stored in separate configuration files or keystores. (Hard coded keys are reported separately by Hard Coded Key pattern) | Security | https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_PASSWORD |
HAZELCAST_SYMMETRIC_ENCRYPTION | The network communications for Hazelcast is configured to use a symmetric cipher (probably DES or blowfish). Those ciphers alone do not provide integrity or secure authentication. The use of asymmetric encryption is preferred. | Security | https://find-sec-bugs.github.io/bugs.htm#HAZELCAST_SYMMETRIC_ENCRYPTION |
HTTP_PARAMETER_POLLUTION | Concatenating unvalidated user input into a URL can allow an attacker to override the value of a request parameter. Attacker may be able to override existing parameter values, inject a new parameter or exploit variables out of a direct reach. HTTP Parameter Pollution (HPP) attacks consist of injecting encoded query string delimiters into other existing parameters. If a web application does not properly sanitize the user input, a malicious user may compromise the logic of the application to perform either client-side or server-side attacks. In the following example the programmer has not considered the possibility that an attacker could provide a lang such as en&user_id=1, which would enable him to change the user_id at will. | Security | https://find-sec-bugs.github.io/bugs.htm#HTTP_PARAMETER_POLLUTION |
HTTP_RESPONSE_SPLITTING | When an HTTP request contains unexpected CR and LF characters, the server may respond with an output stream that is interpreted as two different HTTP responses (instead of one). An attacker can control the second response and mount attacks such as cross-site scripting and cache poisoning attacks. According to OWASP, the issue has been fixed in virtually all modern Java EE application servers, but it is still better to validate the input. If you are concerned about this risk, you should test on the platform of concern to see if the underlying platform allows for CR or LF characters to be injected into headers. This weakness is reported with lower priority than SQL injection etc., if you are using a vulnerable platform, please check low-priority warnings too. | Security | https://find-sec-bugs.github.io/bugs.htm#HTTP_RESPONSE_SPLITTING |
HTTPONLY_COOKIE | A new cookie is created without the HttpOnly flag set. The HttpOnly flag is a directive to the browser to make sure that the cookie can not be red by malicious script. When a user is the target of a “Cross-Site Scripting”, the attacker would benefit greatly from getting the session id for example. | Security | https://find-sec-bugs.github.io/bugs.htm#HTTPONLY_COOKIE |
INFORMATION_EXPOSURE_THROUGH_AN_ERROR_MESSAGE | The sensitive information may be valuable information on its own (such as a password), or it may be useful for launching other, more deadly attacks. If an attack fails, an attacker may use error information provided by the server to launch another more focused attack. For example, an attempt to exploit a path traversal weakness (CWE-22) might yield the full pathname of the installed application. In turn, this could be used to select the proper number of “..” sequences to navigate to the targeted file. An attack using SQL injection (CWE-89) might not initially succeed, but an error message could reveal the malformed query, which would expose query logic and possibly even passwords or other sensitive information used within the query. | Security | https://find-sec-bugs.github.io/bugs.htm#INFORMATION_EXPOSURE_THROUGH_AN_ERROR_MESSAGE |
INSECURE_COOKIE | A new cookie is created without the Secure flag set. The Secure flag is a directive to the browser to make sure that the cookie is not sent for insecure communication (http://). | Security | https://find-sec-bugs.github.io/bugs.htm#INSECURE_COOKIE |
INSECURE_SMTP_SSL | Server identity verification is disabled when making SSL connections. Some email libraries that enable SSL connections do not verify the server certificate by default. This is equivalent to trusting all certificates. When trying to connect to the server, this application would readily accept a certificate issued to “hackedserver.com”. The application would now potentially leak sensitive user information on a broken SSL connection to the hacked server. | Security | https://find-sec-bugs.github.io/bugs.htm#INSECURE_SMTP_SSL |
JACKSON_UNSAFE_DESERIALIZATION | When the Jackson databind library is used incorrectly the deserialization of untrusted data can lead to remote code execution, if there is a class in classpath that allows the trigger of malicious operation. | Security | https://find-sec-bugs.github.io/bugs.htm#JACKSON_UNSAFE_DESERIALIZATION |
JAXRS_ENDPOINT | This method is part of a REST Web Service (JSR311). The security of this web service should be analyzed. For example:
1. Authentication, if enforced, should be tested. |
Security | https://find-sec-bugs.github.io/bugs.htm#JAXRS_ENDPOINT |
JAXWS_ENDPOINT | This method is part of a SOAP Web Service (JSR224). The security of this web service should be analyzed. For example:
1. Authentication, if enforced, should be tested. |
Security | https://find-sec-bugs.github.io/bugs.htm#JAXWS_ENDPOINT |
JSP_INCLUDE | The inclusion of JSP file allow the entry of dynamic value. It may allow an attacker to control the JSP page included. If this is the case, an attacker will try to include a file on disk that he controls. By including arbitrary files, the attacker gets the ability to execute any code. | Security | https://find-sec-bugs.github.io/bugs.htm#JSP_INCLUDE |
JSP_JSTL_OUT | A potential XSS was found. It could be used to execute unwanted JavaScript in a client’s browser. (See references) | Security | https://find-sec-bugs.github.io/bugs.htm#JSP_JSTL_OUT |
JSP_SPRING_EVAL | A Spring expression is built with a dynamic value. The source of the value(s) should be verified to avoid that unfiltered values fall into this risky code evaluation. | Security | https://find-sec-bugs.github.io/bugs.htm#JSP_SPRING_EVAL |
JSP_XSLT | XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents into other XML documents. It is possible to attach malicious behavior to those stylesheets. Therefore, if an attacker can control the content or the source of the stylesheet, he might be able to trigger remote code execution. | Security | https://find-sec-bugs.github.io/bugs.htm#JSP_XSLT |
LDAP_ANONYMOUS | Without proper access control, executing an LDAP statement that contains a user-controlled value can allow an attacker to abuse poorly configured LDAP environment. All LDAP queries executed against ctx will be performed without authentication and access control. An attacker may be able to manipulate one of these queries in an unexpected way to gain access to records that would otherwise be protected by the directory’s access control mechanism. | Security | https://find-sec-bugs.github.io/bugs.htm#LDAP_ANONYMOUS |
LDAP_ENTRY_POISONING | JNDI API support the binding of serialize object in LDAP directories. If certain attributes are presented, the deserialization of object will be made in the application querying the directory (See Black Hat USA 2016 white paper for details). Object deserialization should be threated as risky operation that can lead to remote code execution. The exploitation of the vulnerability will be possible if the attacker has an entry point in an LDAP base query, by adding attributes to an existing LDAP entry or by configuring the application to use a malicious LDAP server. | Security | https://find-sec-bugs.github.io/bugs.htm#LDAP_ENTRY_POISONING |
LDAP_INJECTION | Just like SQL, all inputs passed to an LDAP query need to be passed in safely. Unfortunately, LDAP doesn’t have prepared statement interfaces like SQL. Therefore, the primary defense against LDAP injection is strong input validation of any untrusted data before including it in an LDAP query. | Security | https://find-sec-bugs.github.io/bugs.htm#LDAP_INJECTION |
MALICIOUS_XSLT | “XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents into other XML documents”. It is possible to attach malicious behavior to those stylesheets. Therefore, if an attacker can control the content or the source of the stylesheet, he might be able to trigger remote code execution. | Security | https://find-sec-bugs.github.io/bugs.htm#MALICIOUS_XSLT |
NULL_CIPHER | The NullCipher is rarely used intentionally in production applications. It implements the Cipher interface by returning ciphertext identical to the supplied plaintext. In a few contexts, such as testing, a NullCipher may be appropriate. | Security | https://find-sec-bugs.github.io/bugs.htm#NULL_CIPHER |
OBJECT_DESERIALIZATION | Object deserialization of untrusted data can lead to remote code execution, if there is a class in classpath that allows the trigger of malicious operation. Libraries developers tend to fix class that provided potential malicious trigger. There are still classes that are known to trigger Denial of Service. Deserialization is a sensible operation that has a great history of vulnerabilities. The web application might become vulnerable as soon as a new vulnerability is found in the Java Virtual Machine. | Security | https://find-sec-bugs.github.io/bugs.htm#OBJECT_DESERIALIZATION |
OGNL_INJECTION | A expression is built with a dynamic value. The source of the value(s) should be verified to avoid that unfiltered values fall into this risky code evaluation. | Security | https://find-sec-bugs.github.io/bugs.htm#OGNL_INJECTION |
PADDING_ORACLE | This specific mode of CBC with PKCS5Padding is susceptible to padding oracle attacks. An adversary could potentially decrypt the message if the system exposed the difference between plaintext with invalid padding or valid padding. The distinction between valid and invalid padding is usually revealed through distinct error messages being returned for each condition. | Security | https://find-sec-bugs.github.io/bugs.htm#PADDING_ORACLE |
PATH_TRAVERSAL_IN | A file is opened to read its content. The filename comes from an input parameter. If an unfiltered parameter is passed to this file API, files from an arbitrary filesystem location could be read. This rule identifies potential path traversal vulnerabilities. In many cases, the constructed file path cannot be controlled by the user. If that is the case, the reported instance is a false positive. | Security | https://find-sec-bugs.github.io/bugs.htm#PATH_TRAVERSAL_IN |
PATH_TRAVERSAL_OUT | A file is opened to write to its contents. The filename comes from an input parameter. If an unfiltered parameter is passed to this file API, files at an arbitrary filesystem location could be modified. This rule identifies potential path traversal vulnerabilities. In many cases, the constructed file path cannot be controlled by the user. If that is the case, the reported instance is a false positive. | Security | https://find-sec-bugs.github.io/bugs.htm#PATH_TRAVERSAL_OUT |
PERMISSIVE_CORS | Prior to HTML5, Web browsers enforced the Same Origin Policy which ensures that in order for JavaScript to access the contents of a Web page, both the JavaScript and the Web page must originate from the same domain. Without the Same Origin Policy, a malicious website could serve up JavaScript that loads sensitive information from other websites using a client’s credentials, cull through it, and communicate it back to the attacker. HTML5 makes it possible for JavaScript to access data across domains if a new HTTP header called Access-Control-Allow-Origin is defined. With this header, a Web server defines which other domains are allowed to access its domain using cross-origin requests. However, caution should be taken when defining the header because an overly permissive CORS policy will allow a malicious application to communicate with the victim application in an inappropriate way, leading to spoofing, data theft, relay and other attacks. | Security | https://find-sec-bugs.github.io/bugs.htm#PERMISSIVE_CORS |
PLAY_UNVALIDATED_REDIRECT | Unvalidated redirects occur when an application redirects a user to a destination URL specified by a user supplied parameter that is not validated. Such vulnerabilities can be used to facilitate phishing attacks.
Scenario: |
Security | https://find-sec-bugs.github.io/bugs.htm#PLAY_UNVALIDATED_REDIRECT |
PREDICTABLE_RANDOM | The use of a predictable random value can lead to vulnerabilities when used in certain security critical contexts. For example, when the value is used as: 1. a CSRF token: a predictable token can lead to a CSRF attack as an attacker will know the value of the token 2. a password reset token (sent by email): a predictable password token can lead to an account takeover, since an attacker will guess the URL of the change password form 3. any other secret value A quick fix could be to replace the use of java.util.Random with something stronger, such as java.security.SecureRandom. |
Security | https://find-sec-bugs.github.io/bugs.htm#PREDICTABLE_RANDOM |
PREDICTABLE_RANDOM_SCALA | The use of a predictable random value can lead to vulnerabilities when used in certain security critical contexts. For example, when the value is used as: 1. a CSRF token: a predictable token can lead to a CSRF attack as an attacker will know the value of the token 2. a password reset token (sent by email): a predictable password token can lead to an account takeover, since an attacker will guess the URL of the change password form 3. any other secret value A quick fix could be to replace the use of java.util.Random with something stronger, such as java.security.SecureRandom. |
Security | https://find-sec-bugs.github.io/bugs.htm#PREDICTABLE_RANDOM_SCALA |
REDOS | Regular expressions (regexs) are frequently subject to Denial of Service (DOS) attacks (called ReDOS). This is due to the fact that regex engines may take a large amount of time when analyzing certain strings, depending on how the regex is defined. For example, for the regex: ^(a+)+$, the input “aaaaaaaaaaaaaaaaX” will cause the regex engine to analyze 65536 different paths. Therefore, it is possible that a single request may cause a large amount of computation on the server side. The problem with this regex, and others like it, is that there are two different ways the same input character can be accepted by the Regex due to the + (or a *) inside the parenthesis, and the + (or a *) outside the parenthesis. The way this is written, either + could consume the character ‘a’. To fix this, the regex should be rewritten to eliminate the ambiguity. For example, this could simply be rewritten as: ^a+$, which is presumably what the author meant anyway (any number of a’s). Assuming that’s what the original regex meant, this new regex can be evaluated quickly, and is not subject to ReDOS. | Security | https://find-sec-bugs.github.io/bugs.htm#REDOS |
REQUESTDISPATCHER_FILE_DISCLOSURE | Constructing a server-side redirect path with user input could allow an attacker to download application binaries (including application classes or jar files) or view arbitrary files within protected directories. An attacker may be able to forge a request parameter to match sensitive file locations. For example, requesting “http://example.com/?jspFile=../applicationContext.xml%3F” would display the application’s applicationContext.xml file. The attacker would be able to locate and download the applicationContext.xml referenced in the other configuration files, and even class files or jar files, obtaining sensitive information and launching other types of attacks. | Security | https://find-sec-bugs.github.io/bugs.htm#REQUESTDISPATCHER_FILE_DISCLOSURE |
RSA_KEY_SIZE | The NIST recommends the use of 2048 bits and higher keys for the RSA algorithm. 1. “Digital Signature Verification | RSA: 1024 ≤ len(n) < 2048 | Legacy-use” 2. “Digital Signature Verification | RSA: len(n) ≥ 2048 | Acceptable” |
Security | https://find-sec-bugs.github.io/bugs.htm#RSA_KEY_SIZE |
RSA_NO_PADDING | The software uses the RSA algorithm but does not incorporate Optimal Asymmetric Encryption Padding (OAEP), which might weaken the encryption. | Security | https://find-sec-bugs.github.io/bugs.htm#RSA_NO_PADDING |
SCALA_COMMAND_INJECTION | The highlighted API is used to execute a system command. If unfiltered input is passed to this API, it can lead to arbitrary command execution. | Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_COMMAND_INJECTION |
SCALA_PATH_TRAVERSAL_IN | A file is opened to read its content. The filename comes from an input parameter. If an unfiltered parameter is passed to this file API, files from an arbitrary filesystem location could be read. This rule identifies potential path traversal vulnerabilities. In many cases, the constructed file path cannot be controlled by the user. If that is the case, the reported instance is a false positive. | Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_PATH_TRAVERSAL_IN |
SCALA_PLAY_SSRF | Server-Side Request Forgery occur when a web server executes a request to a user supplied destination parameter that is not validated. Such vulnerabilities could allow an attacker to access internal services or to launch attacks from your web server. | Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_PLAY_SSRF |
SCALA_SENSITIVE_DATA_EXPOSURE | Applications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Pages that provide different responses based on the validity of the data can lead to Information Leakage; specifically when data deemed confidential is being revealed as a result of the web application’s design. Examples of sensitive data includes (but is not limited to): API keys, passwords, product versions or environment configurations. | Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_SENSITIVE_DATA_EXPOSURE |
SCALA_SQL_INJECTION_ANORM | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_SQL_INJECTION_ANORM |
SCALA_SQL_INJECTION_SLICK | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_SQL_INJECTION_SLICK |
SCALA_XSS_MVC_API | A potential XSS was found. It could be used to execute unwanted JavaScript in a client’s browser. (See references) | Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_XSS_MVC_API |
SCALA_XSS_TWIRL | A potential XSS was found. It could be used to execute unwanted JavaScript in a client’s browser. (See references)
Vulnerable Code: @value Solution: @value The best defense against XSS is context sensitive output encoding like the example above. There are typically 4 contexts to consider: HTML, JavaScript, CSS (styles), and URLs. Please follow the XSS protection rules defined in the OWASP XSS Prevention Cheat Sheet, which explains these defenses in significant detail. |
Security | https://find-sec-bugs.github.io/bugs.htm#SCALA_XSS_TWIRL |
SCRIPT_ENGINE_INJECTION | Dymanic code is being evaluate. A careful analysis of the code construction should be made. Malicious code execution could lead to data leakage or operating system compromised. If the evaluation of user code is intended, a proper sandboxing should be applied (see references). | Security | https://find-sec-bugs.github.io/bugs.htm#SCRIPT_ENGINE_INJECTION |
SEAM_LOG_INJECTION | Seam Logging API support an expression language to introduce bean property to log messages. The expression language can also be the source to unwanted code execution. In this context, an expression is built with a dynamic value. The source of the value(s) should be verified to avoid that unfiltered values fall into this risky code evaluation. | Security | https://find-sec-bugs.github.io/bugs.htm#SEAM_LOG_INJECTION |
SERVLET_CONTENT_TYPE | The HTTP header Content-Type can be controlled by the client. As such, its value should not be used in any security critical decisions. | Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_CONTENT_TYPE |
SERVLET_HEADER | Request headers can easily be altered by the requesting user. In general, no assumption should be made that the request came from a regular browser without modification by an attacker. As such, it is recommended that you not trust this value in any security decisions you make with respect to a request. | Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_HEADER |
SERVLET_HEADER_REFERER | Behavior: Any value can be assigned to this header if the request is coming from a malicious user. The “Referer” will not be present if the request was initiated from another origin that is secure (https).
Recommendations: No access control should be based on the value of this header. No CSRF protection should be based only on this value (because it is optional). |
Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_HEADER_REFERER |
SERVLET_HEADER_USER_AGENT | The header “User-Agent” can easily be spoofed by the client. Adopting different behaviors based on the User-Agent (for crawler UA) is not recommended. | Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_HEADER_USER_AGENT |
SERVLET_PARAMETER | The Servlet can read GET and POST parameters from various methods. The value obtained should be considered unsafe. You may need to validate or sanitize those values before passing them to sensitive APIs such as:
1. SQL query (May lead to SQL injection) |
Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_PARAMETER |
SERVLET_QUERY_STRING | The query string is the concatenation of the GET parameter names and values. Parameters other than those intended can be passed in.
For the URL request /app/servlet.htm?a=1&b=2, the query string extract will be a=1&b=2 Just as is true for individual parameter values retrieved via methods like HttpServletRequest.getParameter(), the value obtained from HttpServletRequest.getQueryString() should be considered unsafe. You may need to validate or sanitize anything pulled from the query string before passing it to sensitive API |
Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_QUERY_STRING |
SERVLET_SERVER_NAME | The hostname header can be controlled by the client. As such, its value should not be used in any security critical decisions. Both ServletRequest.getServerName() and HttpServletRequest.getHeader(“Host”) have the same behavior which is to extract the Host header.
GET /testpage HTTP/1.1 The web container serving your application may redirect requests to your application by default. This would allow a malicious user to place any value in the Host header. It is recommended that you do not trust this value in any security decisions you make with respect to a request. |
Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_SERVER_NAME |
SERVLET_SESSION_ID | The method HttpServletRequest.getRequestedSessionId() typically returns the value of the cookie JSESSIONID. This value is normally only accessed by the session management logic and not normal developer code. The value passed to the client is generally an alphanumeric value (e.g., JSESSIONID=jp6q31lq2myn). However, the value can be altered by the client. The following HTTP request illustrates the potential modification.
GET /somePage HTTP/1.1 As such, the JSESSIONID should only be used to see if its value matches an existing session ID. If it does not, the user should be considered an unauthenticated user. In addition, the session ID value should never be logged. If it is, then the log file could contain valid active session IDs, allowing an insider to hijack any sessions whose IDs have been logged and are still active. |
Security | https://find-sec-bugs.github.io/bugs.htm#SERVLET_SESSION_ID |
SMTP_HEADER_INJECTION | Simple Mail Transfer Protocol (SMTP) is a the text based protocol used for email delivery. Like with HTTP, headers are separate by new line separator. If user input is place in a header line, the application should remove or replace new line characters (CR / LF). You should use a safe wrapper such as Apache Common Email and Simple Java Mail which filter special characters that can lead to header injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SMTP_HEADER_INJECTION |
SPEL_INJECTION | A Spring expression is built with a dynamic value. The source of the value(s) should be verified to avoid that unfiltered values fall into this risky code evaluation. | Security | https://find-sec-bugs.github.io/bugs.htm#SPEL_INJECTION |
SPRING_CSRF_PROTECTION_DISABLED | Disabling Spring Security’s CSRF protection is unsafe for standard web applications. A valid use case for disabling this protection would be a service exposing state-changing operations that is guaranteed to be used only by non-browser clients. | Security | https://find-sec-bugs.github.io/bugs.htm#SPRING_CSRF_PROTECTION_DISABLED |
SPRING_CSRF_UNRESTRICTED_REQUEST_MAPPING | Methods annotated with RequestMapping are by default mapped to all the HTTP request methods. However, Spring Security’s CSRF protection is not enabled by default for the HTTP request methods GET, HEAD, TRACE, and OPTIONS (as this could cause the tokens to be leaked). Therefore, state-changing methods annotated with RequestMapping and not narrowing the mapping to the HTTP request methods POST, PUT, DELETE, or PATCH are vulnerable to CSRF attacks. | Security | https://find-sec-bugs.github.io/bugs.htm#SPRING_CSRF_UNRESTRICTED_REQUEST_MAPPING |
SPRING_ENDPOINT | This class is a Spring Controller. All methods annotated with RequestMapping (as well as its shortcut annotations GetMapping, PostMapping, PutMapping, DeleteMapping, and PatchMapping) are reachable remotely. This class should be analyzed to make sure that remotely exposed methods are safe to expose to potential attackers. | Security | https://find-sec-bugs.github.io/bugs.htm#SPRING_ENDPOINT |
SPRING_FILE_DISCLOSURE | Constructing a server-side redirect path with user input could allow an attacker to download application binaries (including application classes or jar files) or view arbitrary files within protected directories. An attacker may be able to forge a request parameter to match sensitive file locations. For example, requesting “http://example.com/?returnURL=WEB-INF/applicationContext.xml” would display the application’s applicationContext.xml file. The attacker would be able to locate and download the applicationContext.xml referenced in the other configuration files, and even class files or jar files, obtaining sensitive information and launching other types of attacks. | Security | https://find-sec-bugs.github.io/bugs.htm#SPRING_FILE_DISCLOSURE |
SPRING_UNVALIDATED_REDIRECT | Unvalidated redirects occur when an application redirects a user to a destination URL specified by a user supplied parameter that is not validated. Such vulnerabilities can be used to facilitate phishing attacks.
Scenario: |
Security | https://find-sec-bugs.github.io/bugs.htm#SPRING_UNVALIDATED_REDIRECT |
SQL_INJECTION | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. Alternatively to prepare statements, each parameter can be escaped manually. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION |
SQL_INJECTION_ANDROID | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_ANDROID |
SQL_INJECTION_HIBERNATE | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. Alternatively to prepare statements, Hibernate Criteria can be used. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_HIBERNATE |
SQL_INJECTION_JDBC | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_JDBC |
SQL_INJECTION_JDO | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_JDO |
SQL_INJECTION_JPA | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_JPA |
SQL_INJECTION_SPRING_JDBC | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_SPRING_JDBC |
SQL_INJECTION_TURBINE | The input values included in SQL queries need to be passed in safely. Bind variables in prepared statements can be used to easily mitigate the risk of SQL injection. Turbine API provide a DSL to build query with Java code. | Security | https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_TURBINE |
SSL_CONTEXT | Security | https://find-sec-bugs.github.io/bugs.htm#SSL_CONTEXT | |
STATIC_IV | Initialization vector must be regenerated for each message to be encrypted. | Security | https://find-sec-bugs.github.io/bugs.htm#STATIC_IV |
STRUTS_FILE_DISCLOSURE | Constructing a server-side redirect path with user input could allow an attacker to download application binaries (including application classes or jar files) or view arbitrary files within protected directories. An attacker may be able to forge a request parameter to match sensitive file locations. For example, requesting “http://example.com/?returnURL=WEB-INF/applicationContext.xml” would display the application’s applicationContext.xml file. The attacker would be able to locate and download the applicationContext.xml referenced in the other configuration files, and even class files or jar files, obtaining sensitive information and launching other types of attacks. | Security | https://find-sec-bugs.github.io/bugs.htm#STRUTS_FILE_DISCLOSURE |
STRUTS_FORM_VALIDATION | Form inputs should have minimal input validation. Preventive validation helps provide defense in depth against a variety of risks. Validation can be introduce by implementing a validate method. | Security | https://find-sec-bugs.github.io/bugs.htm#STRUTS_FORM_VALIDATION |
STRUTS1_ENDPOINT | This class is a Struts 1 Action. | Security | https://find-sec-bugs.github.io/bugs.htm#STRUTS1_ENDPOINT |
STRUTS2_ENDPOINT | In Struts 2, the endpoints are Plain Old Java Objects (POJOs) which means no Interface/Class needs to be implemented/extended. | Security | https://find-sec-bugs.github.io/bugs.htm#STRUTS2_ENDPOINT |
TAPESTRY_ENDPOINT | A Tapestry endpoint was discovered at application startup. Tapestry apps are structured with a backing Java class and a corresponding Tapestry Markup Language page (a .tml file) for each page. When a request is received, the GET/POST parameters are mapped to specific inputs in the backing Java class. The mapping is either done with fieldName:
[…] protected String input; […] or the definition of an explicit annotation: […]@org.apache.tapestry5.annotations.Parameter protected String parameter1; @org.apache.tapestry5.annotations.Component(id = “password”) The page is mapped to the view [/resources/package/PageName].tml. Each Tapestry page in this application should be researched to make sure all inputs that are automatically mapped in this way are properly validated before they are used. |
Security | https://find-sec-bugs.github.io/bugs.htm#TAPESTRY_ENDPOINT |
TDES_USAGE | Triple DES (also known as 3DES or DESede) is considered strong ciphers for modern applications. Currently, NIST recommends the usage of AES block ciphers instead of 3DES. | Security | https://find-sec-bugs.github.io/bugs.htm#TDES_USAGE |
TEMPLATE_INJECTION_FREEMARKER | Freemarker template engine is powerful. It is possible to add logic including condition statements, loops and external calls. It is not design to be sandbox to templating operations. A malicious user in control of a template can run malicious code on the server-side. Freemarker templates should be seen as scripts. | Security | https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_FREEMARKER |
TEMPLATE_INJECTION_VELOCITY | Velocity template engine is powerful. It is possible to add logic including condition statements, loops and external calls. It is not design to be sandbox to templating operations. A malicious user in control of a template can run malicious code on the server-side. Velocity templates should be seen as scripts. | Security | https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_VELOCITY |
TRUST_BOUNDARY_VIOLATION | “A trust boundary can be thought of as line drawn through a program. On one side of the line, data is untrusted. On the other side of the line, data is assumed to be trustworthy. The purpose of validation logic is to allow data to safely cross the trust boundary – to move from untrusted to trusted. A trust boundary violation occurs when a program blurs the line between what is trusted and what is untrusted. By combining trusted and untrusted data in the same data structure, it becomes easier for programmers to mistakenly trust unvalidated data.” | Security | https://find-sec-bugs.github.io/bugs.htm#TRUST_BOUNDARY_VIOLATION |
UNENCRYPTED_SERVER_SOCKET | The communication channel used is not encrypted. The traffic could be read by an attacker intercepting the network traffic. | Security | https://find-sec-bugs.github.io/bugs.htm#UNENCRYPTED_SERVER_SOCKET |
UNENCRYPTED_SOCKET | The communication channel used is not encrypted. The traffic could be read by an attacker intercepting the network traffic. | Security | https://find-sec-bugs.github.io/bugs.htm#UNENCRYPTED_SOCKET |
UNSAFE_HASH_EQUALS | An attacker might be able to detect the value of the secret hash due to the exposure of comparison timing. When the functions Arrays.equals() or String.equals() are called, they will exited earlier if less bytes are matched. | Security | https://find-sec-bugs.github.io/bugs.htm#UNSAFE_HASH_EQUALS |
UNVALIDATED_REDIRECT | Unvalidated redirects occur when an application redirects a user to a destination URL specified by a user supplied parameter that is not validated. Such vulnerabilities can be used to facilitate phishing attacks.
Scenario:. |
Security | https://find-sec-bugs.github.io/bugs.htm#UNVALIDATED_REDIRECT |
URL_REWRITING | The implementation of this method includes the logic to determine whether the session ID needs to be encoded in the URL. URL rewriting has significant security risks. Since session ID appears in the URL, it may be easily seen by third parties. Session ID in the URL can be disclosed in many ways, for example: 1. Log files, 2. The browser history, 3. By copy-and-pasting it into an e-mail or posting, 4. The HTTP Referrer. |
Security | https://find-sec-bugs.github.io/bugs.htm#URL_REWRITING |
URLCONNECTION_SSRF_FD | Server-Side Request Forgery occur when a web server executes a request to a user supplied destination parameter that is not validated. Such vulnerabilities could allow an attacker to access internal services or to launch attacks from your web server. URLConnection can be used with file:// protocol or other protocols to access local filesystem and potentially other services. | Security | https://find-sec-bugs.github.io/bugs.htm#URLCONNECTION_SSRF_FD |
WEAK_FILENAMEUTILS | Some FilenameUtils’ methods don’t filter NULL bytes (0x00). If a null byte is injected into a filename, if this filename is passed to the underlying OS, the file retrieved will be the name of the file that is specified prior to the NULL byte, since at the OS level, all strings are terminated by a null byte even though Java itself doesn’t care about null bytes or treat them special. This OS behavior can be used to bypass filename validation that looks at the end of the filename (e.g., endswith “.log”) to make sure its a safe file to access. | Security | https://find-sec-bugs.github.io/bugs.htm#WEAK_FILENAMEUTILS |
WEAK_HOSTNAME_VERIFIER | A HostnameVerifier that accept any host are often use because of certificate reuse on many hosts. As a consequence, this is vulnerable to Man-in-the-middle attacks since the client will trust any certificate. A TrustManager allowing specific certificates (based on a truststore for example) should be built. Wildcard certificates should be created for reused on multiples subdomains. | Security | https://find-sec-bugs.github.io/bugs.htm#WEAK_HOSTNAME_VERIFIER |
WEAK_MESSAGE_DIGEST_MD5 | The algorithms MD2, MD4 and MD5 are not a recommended MessageDigest. PBKDF2 should be used to hash password for example.
“The security of the MD5 hash function is severely compromised. A collision attack exists that can find collisions within seconds on a computer with a 2.6 GHz Pentium 4 processor (complexity of 224.1).[1] Further, there is also a chosen-prefix collision attack that can produce a collision for two inputs with specified prefixes within hours, using off-the-shelf computing hardware (complexity 239).[2]” – Wikipedia: MD5 – Security “SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256: The use of these hash functions is acceptable for all hash function applications.” – NIST: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths p.15 “The main idea of a PBKDF is to slow dictionary or brute force attacks on the passwords by increasing the time needed to test each password. An attacker with a list of likely passwords can evaluate the PBKDF using the known iteration counter and the salt. Since an attacker has to spend a significant amount of computing time for each try, it becomes harder to apply the dictionary or brute force attacks.” – NIST: Recommendation for Password-Based Key Derivation p.12 |
Security | https://find-sec-bugs.github.io/bugs.htm#WEAK_MESSAGE_DIGEST_MD5 |
WEAK_MESSAGE_DIGEST_SHA1 | The algorithms SHA-1 is not a recommended algorithm for hash password, for signature verification and other uses. PBKDF2 should be used to hash password for example.
“SHA-1 for digital signature generation: SHA-1 may only be used for digital signature generation where specifically allowed by NIST protocol-specific guidance. For all other applications, SHA-1 shall not be used for digital signature generation. SHA-1 for digital signature verification: For digital signature verification, SHA-1 is allowed for legacy-use. […] SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256: The use of these hash functions is acceptable for all hash function applications.” – NIST: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths p.15 “The main idea of a PBKDF is to slow dictionary or brute force attacks on the passwords by increasing the time needed to test each password. An attacker with a list of likely passwords can evaluate the PBKDF using the known iteration counter and the salt. Since an attacker has to spend a significant amount of computing time for each try, it becomes harder to apply the dictionary or brute force attacks.” – NIST: Recommendation for Password-Based Key Derivation p.12 |
Security | https://find-sec-bugs.github.io/bugs.htm#WEAK_MESSAGE_DIGEST_SHA1 |
WEAK_TRUST_MANAGER | Empty TrustManager implementations are often used to connect easily to a host that is not signed by a root certificate authority. As a consequence, this is vulnerable to Man-in-the-middle attacks since the client will trust any certificate. A TrustManager allowing specific certificates (based on a truststore for example) should be built. | Security | https://find-sec-bugs.github.io/bugs.htm#WEAK_TRUST_MANAGER |
WICKET_ENDPOINT | XMLDecoder should not be used to parse untrusted data. Deserializing user input can lead to arbitrary code execution. This is possible because XMLDecoder supports arbitrary method invocation. This capability is intended to call setter methods, but in practice, any method can be called.
Malicious XML example: The XML code above will cause the creation of a file with the content “Hello World!”. Vulnerable Code: Solution: The solution is to avoid using XMLDecoder to parse content from an untrusted source. |
Security | https://find-sec-bugs.github.io/bugs.htm#WICKET_ENDPOINT |
XML_DECODER | XMLDecoder should not be used to parse untrusted data. Deserializing user input can lead to arbitrary code execution. This is possible because XMLDecoder supports arbitrary method invocation. This capability is intended to call setter methods, but in practice, any method can be called. | Security | https://find-sec-bugs.github.io/bugs.htm#XML_DECODER |
XPATH_INJECTION | XPath injection risks are similar to SQL injection. If the XPath query contains untrusted user input, the complete datasource could be exposed. This could allow an attacker to access unauthorized data or maliciously modify the target XML. | Security | https://find-sec-bugs.github.io/bugs.htm#XPATH_INJECTION |
XSS_JSP_PRINT | A potential XSS was found. It could be used to execute unwanted JavaScript in a client’s browser. (See references) | Security | https://find-sec-bugs.github.io/bugs.htm#XSS_JSP_PRINT |
XSS_REQUEST_WRAPPER | An implementation of HttpServletRequestWrapper called XSSRequestWrapper was published through various blog sites.
The filtering is weak for a few reasons: |
Security | https://find-sec-bugs.github.io/bugs.htm#XSS_REQUEST_WRAPPER |
XSS_SERVLET | A potential XSS was found. It could be used to execute unwanted JavaScript in a client’s browser. (See references) | Security | https://find-sec-bugs.github.io/bugs.htm#XSS_SERVLET |
XXE_DOCUMENT | Attack: XML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML received from an untrusted source. | Security | https://find-sec-bugs.github.io/bugs.htm#XXE_DOCUMENT |
XXE_DTD_TRANSFORM_FACTORY | Attack: XML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML received from an untrusted source. | Security | https://find-sec-bugs.github.io/bugs.htm#XXE_DTD_TRANSFORM_FACTORY |
XXE_SAXPARSER | Attack: XML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML received from an untrusted source. | Security | https://find-sec-bugs.github.io/bugs.htm#XXE_SAXPARSER |
XXE_XMLREADER | Attack: XML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML received from an untrusted source. | Security | https://find-sec-bugs.github.io/bugs.htm#XXE_XMLREADER |
XXE_XMLSTREAMREADER | Attack: XML External Entity (XXE) attacks can occur when an XML parser supports XML entities while processing XML received from an untrusted source. | Security | https://find-sec-bugs.github.io/bugs.htm#XXE_XMLSTREAMREADER |
XXE_XSLT_TRANSFORM_FACTORY | Attack: XSLT External Entity (XXE) attacks can occur when an XSLT parser supports external entities while processing XSLT received from an untrusted source. | Security | https://find-sec-bugs.github.io/bugs.htm#XXE_XSLT_TRANSFORM_FACTORY |
DP_DO_INSIDE_DO_PRIVILEGED | This code invokes a method that requires a security permission check. If this code will be granted security permissions, but might be invoked by code that does not have security permissions, then the invocation needs to occur inside a doPrivileged block. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#dp-method-invoked-that-should-be-only-be-invoked-inside-a-doprivileged-block-dp-do-inside-do-privileged |
DP_CREATE_CLASSLOADER_INSIDE_DO_PRIVILEGED | This code creates a classloader, which needs permission if a security manage is installed. If this code might be invoked by code that does not have security permissions, then the classloader creation needs to occur inside a doPrivileged block. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#dp-classloaders-should-only-be-created-inside-doprivileged-block-dp-create-classloader-inside-do-privileged |
XSS_REQUEST_PARAMETER_TO_SEND_ERROR | This code directly writes an HTTP parameter to a Server error page (using HttpServletResponse.sendError). Echoing this untrusted input allows for a reflected cross site scripting vulnerability. See http://en.wikipedia.org/wiki/Cross-site_scripting for more information. SpotBugs looks only for the most blatant, obvious cases of cross site scripting. If SpotBugs found any, you almost certainly have more cross site scripting vulnerabilities that SpotBugs doesn’t report. If you are concerned about cross site scripting, you should seriously consider using a commercial static analysis or pen-testing tool. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#xss-servlet-reflected-cross-site-scripting-vulnerability-in-error-page-xss-request-parameter-to-send-error |
XSS_REQUEST_PARAMETER_TO_SERVLET_WRITER | This code directly writes an HTTP parameter to Servlet output, which allows for a reflected cross site scripting vulnerability. See http://en.wikipedia.org/wiki/Cross-site_scripting for more information. SpotBugs looks only for the most blatant, obvious cases of cross site scripting. If SpotBugs found any, you almost certainly have more cross site scripting vulnerabilities that SpotBugs doesn’t report. If you are concerned about cross site scripting, you should seriously consider using a commercial static analysis or pen-testing tool. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#xss-servlet-reflected-cross-site-scripting-vulnerability-xss-request-parameter-to-servlet-writer |
XSS_REQUEST_PARAMETER_TO_JSP_WRITER | This code directly writes an HTTP parameter to JSP output, which allows for a cross site scripting vulnerability. See http://en.wikipedia.org/wiki/Cross-site_scripting for more information. SpotBugs looks only for the most blatant, obvious cases of cross site scripting. If SpotBugs found any, you almost certainly have more cross site scripting vulnerabilities that SpotBugs doesn’t report. If you are concerned about cross site scripting, you should seriously consider using a commercial static analysis or pen-testing tool. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#xss-jsp-reflected-cross-site-scripting-vulnerability-xss-request-parameter-to-jsp-writer |
HRS_REQUEST_PARAMETER_TO_HTTP_HEADER | This code directly writes an HTTP parameter to an HTTP header, which allows for a HTTP response splitting vulnerability. See http://en.wikipedia.org/wiki/HTTP_response_splitting for more information. SpotBugs looks only for the most blatant, obvious cases of HTTP response splitting. If SpotBugs found any, you almost certainly have more vulnerabilities that SpotBugs doesn’t report. If you are concerned about HTTP response splitting, you should seriously consider using a commercial static analysis or pen-testing tool. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#hrs-http-response-splitting-vulnerability-hrs-request-parameter-to-http-header |
HRS_REQUEST_PARAMETER_TO_COOKIE | This code constructs an HTTP Cookie using an untrusted HTTP parameter. If this cookie is added to an HTTP response, it will allow a HTTP response splitting vulnerability. See http://en.wikipedia.org/wiki/HTTP_response_splitting for more information. SpotBugs looks only for the most blatant, obvious cases of HTTP response splitting. If SpotBugs found any, you almost certainly have more vulnerabilities that SpotBugs doesn’t report. If you are concerned about HTTP response splitting, you should seriously consider using a commercial static analysis or pen-testing tool. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#hrs-http-cookie-formed-from-untrusted-input-hrs-request-parameter-to-cookie |
PT_ABSOLUTE_PATH_TRAVERSAL | The software uses an HTTP request parameter to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as “/abs/path” that can resolve to a location that is outside of that directory. See http://cwe.mitre.org/data/definitions/36.html for more information. SpotBugs looks only for the most blatant, obvious cases of absolute path traversal. If SpotBugs found any, you almost certainly have more vulnerabilities that SpotBugs doesn’t report. If you are concerned about absolute path traversal, you should seriously consider using a commercial static analysis or pen-testing tool. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#pt-absolute-path-traversal-in-servlet-pt-absolute-path-traversal |
PT_RELATIVE_PATH_TRAVERSAL | The software uses an HTTP request parameter to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as “..” that can resolve to a location that is outside of that directory. See http://cwe.mitre.org/data/definitions/23.html for more information. SpotBugs looks only for the most blatant, obvious cases of relative path traversal. If SpotBugs found any, you almost certainly have more vulnerabilities that SpotBugs doesn’t report. If you are concerned about relative path traversal, you should seriously consider using a commercial static analysis or pen-testing tool. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#pt-relative-path-traversal-in-servlet-pt-relative-path-traversal |
DMI_CONSTANT_DB_PASSWORD | This code creates a database connect using a hardcoded, constant password. Anyone with access to either the source code or the compiled code can easily learn the password. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#dm-hardcoded-constant-database-password-dmi-constant-db-password |
DMI_EMPTY_DB_PASSWORD | This code creates a database connect using a blank or empty password. This indicates that the database is not protected by a password. | Security | https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#dm-empty-database-password-dmi-empty-db-password |