Code
Testing D:\0_tmp\snyk\webgoat1 ...
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: JavaSource/org/owasp/webgoat/lessons/WeakSessionID.java, line 208
Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 171
Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 192
Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 144
Info: Cookie misses a call to setSecure. Set the Secure flag to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Trust Boundary Violation
Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/ViewProfile.java, line 86
Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.
✗ [Low] Trust Boundary Violation
Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 154
Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.
✗ [Low] Trust Boundary Violation
Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 196
Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.
✗ [Low] Trust Boundary Violation
Path: JavaSource/org/owasp/webgoat/lessons/CrossSiteScripting/FindProfile.java, line 84
Info: Unsanitized input from an HTTP parameter flows into setAttribute where it is used to modify the HTTP session object. This could result in mixing trusted and untrusted data in the same data structure, thus increasing the likelihood to mistakenly trust unvalidated data.
✗ [Low] Use of Password Hash With Insufficient Computational Effort
Path: JavaSource/org/owasp/webgoat/lessons/Encoding.java, line 640
Info: The MD5 hash (used in java.security.MessageDigest.getInstance) is insecure. Consider changing it to a secure hash algorithm
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: JavaSource/org/owasp/webgoat/lessons/WeakSessionID.java, line 208
Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 171
Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 192
Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 144
Info: Cookie misses a call to setHttpOnly. Set the HttpOnly flag to true to protect the cookie from possible malicious code on client side.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 124
Info: Do not hardcode credentials in code.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 93
Info: Do not hardcode credentials in code.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 98
Info: Do not hardcode credentials in code.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 104
Info: Do not hardcode credentials in code.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 133
Info: Do not hardcode credentials in code.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/WeakAuthenticationCookie.java, line 137
Info: Do not hardcode credentials in code.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/WSDLScanning.java, line 146
Info: Do not hardcode credentials in code.
✗ [Low] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/HtmlClues.java, line 83
Info: Do not hardcode credentials in code.
✗ [Medium] Cleartext Transmission of Sensitive Information
Path: JavaSource/org/owasp/webgoat/util/Interceptor.java, line 97
Info: Writing to an unencrypted socket is insecure - a man-in-the-middle attacker can tamper the messages. Consider using SSL sockets.
✗ [Medium] Cleartext Transmission of Sensitive Information
Path: JavaSource/org/owasp/webgoat/util/Interceptor.java, line 98
Info: Reading from an unencrypted socket is insecure - a man-in-the-middle attacker can tamper the messages. Consider using SSL sockets.
✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 195
Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.
✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 198
Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.
✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 209
Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.
✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
Path: JavaSource/org/owasp/webgoat/lessons/HttpOnly.java, line 212
Info: Unsanitized input from cookies flows into setHeader and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.
✗ [Medium] Improper Neutralization of CRLF Sequences in HTTP Headers
Path: JavaSource/org/owasp/webgoat/session/WebSession.java, line 335
Info: Unsanitized input from cookies flows into addCookie and reaches an HTTP header returned to the user. This may allow a malicious input that contain CR/LF to split the http response into two responses and the second response to be controlled by the attacker. This may be used to mount a range of attacks such as cross-site scripting or cache poisoning.
✗ [Medium] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 153
Info: Do not hardcode passwords in code. Found hardcoded password used in equals.
✗ [Medium] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/lessons/HtmlClues.java, line 83
Info: Do not hardcode passwords in code. Found hardcoded password used in equals.
✗ [Medium] Use of Hardcoded Credentials
Path: JavaSource/org/owasp/webgoat/session/CreateDB.java, line 72
Info: Do not hardcode passwords in code. Found hardcoded password used in here.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 220
Info: Unsanitized input from cookies flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/CrossSiteScripting/UpdateProfile.java, line 248
Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/CrossSiteScripting/UpdateProfile.java, line 340
Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/DOS_Login.java, line 134
Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/RoleBasedAccessControl/UpdateProfile.java, line 295
Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/BackDoors.java, line 106
Info: Unsanitized input from an HTTP parameter flows into executeUpdate, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/ViewProfile.java, line 118
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/ViewProfile.java, line 178
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 149
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/SQLInjection/Login.java, line 191
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/SqlNumericInjection.java, line 130
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/DOS_Login.java, line 114
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/RoleBasedAccessControl/Login.java, line 148
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/BlindSqlInjection.java, line 122
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/SqlStringInjection.java, line 112
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/WsSqlInjection.java, line 240
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/admin/ViewDatabase.java, line 89
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/ThreadSafetyProblem.java, line 103
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/RoleBasedAccessControl/UpdateProfile.java, line 176
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] SQL Injection
Path: JavaSource/org/owasp/webgoat/lessons/BackDoors.java, line 113
Info: Unsanitized input from an HTTP parameter flows into executeQuery, where it is used in an SQL query. This may result in an SQL Injection vulnerability.
✗ [High] Path Traversal
Path: JavaSource/org/owasp/webgoat/lessons/admin/SummaryReportCardScreen.java, line 89
Info: Unsanitized input from an HTTP parameter flows into java.io.FileInputStream, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to read arbitrary files.
✗ [High] Path Traversal
Path: JavaSource/org/owasp/webgoat/lessons/admin/ReportCardScreen.java, line 164
Info: Unsanitized input from an HTTP parameter flows into java.io.FileInputStream, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to read arbitrary files.
✗ [High] Path Traversal
Path: JavaSource/org/owasp/webgoat/util/Interceptor.java, line 135
Info: Unsanitized input from the request URL flows into getRequestDispatcher, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to read arbitrary files.
✗ [High] Command Injection
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 649
Info: Unsanitized input from an HTTP parameter flows into exec, where it is used as a shell command. This may result in a Command Injection vulnerability.
✗ [High] Command Injection
Path: JavaSource/org/owasp/webgoat/lessons/Challenge2Screen.java, line 654
Info: Unsanitized input from an HTTP parameter flows into exec, where it is used as a shell command. This may result in a Command Injection vulnerability.
✗ [High] XML External Entity (XXE) Injection
Path: JavaSource/org/owasp/webgoat/lessons/WsSAXInjection.java, line 179
Info: Unsanitized input from an HTTP parameter flows into parse, which allows expansion of external entity references. This may result in a XXE attack leading to the disclosure of confidential data or denial of service.
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/lessons/SQLInjection/SearchStaff.jsp, line 11
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/lessons/CrossSiteScripting/ViewProfile.jsp, line 171
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/lessons/CrossSiteScripting/SearchStaff.jsp, line 11
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/lessons/RoleBasedAccessControl/SearchStaff.jsp, line 11
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/main.jsp, line 114
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/main.jsp, line 119
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/main.jsp, line 124
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/main.jsp, line 130
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/main.jsp, line 135
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/main.jsp, line 163
Info: Unsanitized input from an HTTP parameter flows into print, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] Cross-site Scripting (XSS)
Path: WebContent/main.jsp, line 191
Info: Unsanitized input from cookies flows into println, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
✗ [High] XPath Injection
Path: JavaSource/org/owasp/webgoat/lessons/XPATHInjection.java, line 158
Info: Unsanitized input from an HTTP parameter flows into evaluate, where it is used in an XPath query. This may result in an XPath Injection vulnerability.
✗ [High] Hardcoded Secret
Path: JavaSource/org/owasp/webgoat/lessons/Encoding.java, line 487
Info: Hardcoded value array {...} is used as a cipher salt. Generate the value with a cryptographically strong random number generator such as java.security.SecureRandom instead.
✗ [High] Hardcoded Secret
Path: JavaSource/org/owasp/webgoat/lessons/Encoding.java, line 531
Info: Hardcoded value array {...} is used as a cipher salt. Generate the value with a cryptographically strong random number generator such as java.security.SecureRandom instead.
✔ Test completed
Organization: esecuvali-8y3
Test type: Static code analysis
Project path: D:\0_tmp\snyk\webgoat1
Summary:
71 Code issues found
40 [High] 10 [Medium] 21 [Low]
Open Source
Testing D:\0_tmp\eCommerceWebsite...
Tested 31 dependencies for known issues, found 13 issues, 13 vulnerable paths.
Issues to fix by upgrading:
Upgrade com.fasterxml.jackson.core:jackson-databind@2.11.2 to com.fasterxml.jackson.core:jackson-databind@2.12.7.1 to fix
✗ Denial of Service (DoS) [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424] in com.fasterxml.jackson.core:jackson-databind@2.11.2
introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2
✗ Denial of Service (DoS) [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426] in com.fasterxml.jackson.core:jackson-databind@2.11.2
introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2
✗ Denial of Service (DoS) [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698] in com.fasterxml.jackson.core:jackson-databind@2.11.2
introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2
✗ Denial of Service (DoS) [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244] in com.fasterxml.jackson.core:jackson-databind@2.11.2
introduced by com.fasterxml.jackson.core:jackson-databind@2.11.2
Upgrade com.google.code.gson:gson@2.8.6 to com.google.code.gson:gson@2.8.9 to fix
✗ Deserialization of Untrusted Data [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327] in com.google.code.gson:gson@2.8.6
introduced by com.google.code.gson:gson@2.8.6
Upgrade mysql:mysql-connector-java@5.1.45 to mysql:mysql-connector-java@8.0.28 to fix
✗ Improper Authorization [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-2386864] in mysql:mysql-connector-java@5.1.45
introduced by mysql:mysql-connector-java@5.1.45
✗ XML External Entity (XXE) Injection [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-1766958] in mysql:mysql-connector-java@5.1.45
introduced by mysql:mysql-connector-java@5.1.45
✗ Privilege Escalation [Medium Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-174574] in mysql:mysql-connector-java@5.1.45
introduced by mysql:mysql-connector-java@5.1.45
✗ Access Control Bypass [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-MYSQL-451464] in mysql:mysql-connector-java@5.1.45
introduced by mysql:mysql-connector-java@5.1.45
Upgrade org.hibernate:hibernate-core@5.4.10.Final to org.hibernate:hibernate-core@5.4.24.Final to fix
✗ SQL Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-1041788] in org.hibernate:hibernate-core@5.4.10.Final
introduced by org.hibernate:hibernate-core@5.4.10.Final
✗ SQL Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGHIBERNATE-584563] in org.hibernate:hibernate-core@5.4.10.Final
introduced by org.hibernate:hibernate-core@5.4.10.Final
✗ XML External Entity (XXE) Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGDOM4J-565810] in org.dom4j:dom4j@2.1.1
introduced by org.hibernate:hibernate-core@5.4.10.Final > org.dom4j:dom4j@2.1.1
Issues with no direct upgrade or patch:
✗ XML External Entity (XXE) Injection [High Severity][https://security.snyk.io/vuln/SNYK-JAVA-JSTL-30453] in jstl:jstl@1.2
introduced by jstl:jstl@1.2
No upgrade or patch available
Organization: esecuvali-8y3
Package manager: maven
Target file: pom.xml
Project name: com.team.hknp:eCommerceWebsite
Open source: no
Project path: D:\0_tmp\eCommerceWebsite
Licenses: enabled
