Custodela / iGoat-Swift

OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS
https://igoatapp.com/
GNU General Public License v3.0
0 stars 0 forks source link

CX Jailbrake_File_Referenced_By_Name @ iGoat-Swift/iGoat-Swift/ThirdParty/YapDatabase/Extensions/Relationships/YapDatabaseRelationshipTransaction.m [master] #16

Open tsunez opened 4 years ago

tsunez commented 4 years ago

Jailbrake_File_Referenced_By_Name issue exists @ iGoat-Swift/iGoat-Swift/ThirdParty/YapDatabase/Extensions/Relationships/YapDatabaseRelationshipTransaction.m in branch master

A method removeItemAtPath:error: at line 2959 of iGoat-Swift\iGoat-Swift\ThirdParty\YapDatabase\Extensions\Relationships\YapDatabaseRelationshipTransaction.m accessing a file by filename.

Severity: Low

CWE:668

Vulnerability details and guidance

Checkmarx

Recommended Fix

Lines: 2966


Code (Line #2966):

                if (![fileManager removeItemAtPath:filePath error:&error])

tsunez commented 4 years ago

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)

tsunez commented 4 years ago

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)