Custodela / iGoat-Swift

OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS
https://igoatapp.com/
GNU General Public License v3.0
0 stars 0 forks source link

CX Use_of_Hardcoded_Password @ iGoat-Swift/iGoat-Swift/Source/Exercises/InsecureLocalDataStorage/PlistStorage/Credentials.plist [master] #93

Open tsunez opened 4 years ago

tsunez commented 4 years ago

Use_of_Hardcoded_Password issue exists @ iGoat-Swift/iGoat-Swift/Source/Exercises/InsecureLocalDataStorage/PlistStorage/Credentials.plist in branch master

The application uses a single, hard-coded password "Secret@123" for authentication purposes, either using it to verify users' identities, or to access another remote system. This password at line 1 of iGoat-Swift\iGoat-Swift\Source\Exercises\InsecureLocalDataStorage\PlistStorage\Credentials.plist appears in the code as plaintext, and cannot be changed without rebuilding the application.

Severity: Low

CWE:259

Vulnerability details and guidance

Checkmarx

Recommended Fix

Lines: 1


Code (Line #1):

<?xml version="1.0" encoding="UTF-8"?>

tsunez commented 4 years ago

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)

tsunez commented 4 years ago

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)