Open tsunez opened 4 years ago
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Use_of_Hardcoded_Password issue exists @ iGoat-Swift/iGoat-Swift/Source/Exercises/InsecureLocalDataStorage/PlistStorage/Credentials.plist in branch master
The application uses a single, hard-coded password "Secret@123" for authentication purposes, either using it to verify users' identities, or to access another remote system. This password at line 1 of iGoat-Swift\iGoat-Swift\Source\Exercises\InsecureLocalDataStorage\PlistStorage\Credentials.plist appears in the code as plaintext, and cannot be changed without rebuilding the application.
Severity: Low
CWE:259
Vulnerability details and guidance
Checkmarx
Recommended Fix
Lines: 1
Code (Line #1):