-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #34 from julz0815/development
Development
- Loading branch information
Showing
5 changed files
with
247 additions
and
85 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
{ | ||
"_links": { | ||
"root": { | ||
"href": "/" | ||
}, | ||
"self": { | ||
"href": "/scans/a895828c-bfed-4c4b-9c47-d5b8e341ccc1/findings" | ||
}, | ||
"help": { | ||
"href": "https://help.veracode.com/reader/tS9CaFwL4_lbIEWWomsJoA/ovfZGgu96UINQxIuTqRDwg" | ||
} | ||
}, | ||
"scan_id": "a895828c-bfed-4c4b-9c47-d5b8e341ccc1", | ||
"scan_status": "SUCCESS", | ||
"message": "Scan successful. Results size: 330779 bytes", | ||
"modules": [ | ||
"verademo.war", | ||
"JS files within verademo.war" | ||
], | ||
"modules_count": 2, | ||
"findings": [ | ||
{ | ||
"title": "java.lang.Runtime.exec", | ||
"issue_id": 1246, | ||
"gob": "B", | ||
"severity": 5, | ||
"issue_type_id": "taint", | ||
"issue_type": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", | ||
"cwe_id": "78", | ||
"display_text": "\u003cspan\u003eThis call to java.lang.Runtime.exec() contains a command injection flaw. The argument to the function is constructed using untrusted input. If an attacker is allowed to specify all or part of the command, it may be possible to execute commands on the server with the privileges of the executing process. The level of exposure depends on the effectiveness of input validation routines, if any. The first argument to exec() contains tainted data from the variables (new String\\[...\\]). The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.\u003c/span\u003e \u003cspan\u003eValidate all untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. When using blocklists, be sure that the sanitizing routine performs a sufficient number of iterations to remove all instances of disallowed characters. Most APIs that execute system commands also have a \"safe\" version of the method that takes an array of strings as input rather than a single string, which protects against some forms of command injection.\u003c/span\u003e \u003cspan\u003eReferences: \u003ca href\u003d\"https://cwe.mitre.org/data/definitions/78.html\"\u003eCWE\u003c/a\u003e \u003ca href\u003d\"https://www.owasp.org/index.php/Command_Injection\"\u003eOWASP\u003c/a\u003e \u003ca href\u003d\"https://webappsec.pbworks.com/OS-Commanding\"\u003eWASC\u003c/a\u003e\u003c/span\u003e", | ||
"files": { | ||
"source_file": { | ||
"file": "com/veracode/verademo/controller/ToolsController.java", | ||
"line": 91, | ||
"function_name": "fortune", | ||
"qualified_function_name": "com.veracode.verademo.controller.ToolsController.fortune", | ||
"function_prototype": "java.lang.String fortune(java.lang.String)", | ||
"scope": "com.veracode.verademo.controller.ToolsController" | ||
} | ||
}, | ||
"flaw_match": { | ||
"procedure_hash": "2161030689", | ||
"prototype_hash": "3827778930", | ||
"flaw_hash": "3753823106", | ||
"flaw_hash_count": 1, | ||
"flaw_hash_ordinal": 1, | ||
"cause_hash": "4165693487", | ||
"cause_hash_count": 1, | ||
"cause_hash_ordinal": 1 | ||
} | ||
} | ||
], | ||
"pipeline_scan": "21.1.2-0", | ||
"dev_stage": "DEVELOPMENT" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
# VeraDemo - Blab-a-Gag | ||
# VeraDemo - Blab-a-Gag. | ||
|
||
## About | ||
|
||
|
Binary file not shown.