Open mend-for-github-com[bot] opened 2 months ago
Latest Scan: 2024-08-30 09:32pm Total Findings: 35 | New Findings: 0 | Resolved Findings: 0 Tested Project Files: 246 Detected Programming Languages: 2 (JavaScript / TypeScript*, Python)
The list below presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the Mend Application.
Code Security Report
Scan Metadata
Latest Scan: 2024-08-30 09:32pm Total Findings: 35 | New Findings: 0 | Resolved Findings: 0 Tested Project Files: 246 Detected Programming Languages: 2 (JavaScript / TypeScript*, Python)
Most Relevant Findings
Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L369-L3741 Data Flow/s detected
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L363 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L364 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L368 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L374Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/python/vanilla) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/mitre.py#L225-L2301 Data Flow/s detected
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/mitre.py#L237 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/mitre.py#L238 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/mitre.py#L229 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/mitre.py#L230Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/python/vanilla) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L798-L8032 Data Flow/s detected
View Data Flow 1
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L783 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L789 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L803View Data Flow 2
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L784 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L789 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L803Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/python/vanilla) ● Videos ▪ [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4) ● Further Reading ▪ [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html) ▪ [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection) ▪ [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html) ▪ [Preventing SQL Injection Attacks With Python](https://realpython.com/prevent-python-sql-injection/)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L107-L1122 Data Flow/s detected
View Data Flow 1
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L100 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L108 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L112View Data Flow 2
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L102 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L108 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L112Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/python/vanilla) ● Videos ▪ [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4) ● Further Reading ▪ [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html) ▪ [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection) ▪ [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html) ▪ [Preventing SQL Injection Attacks With Python](https://realpython.com/prevent-python-sql-injection/)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L508-L5131 Data Flow/s detected
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L508Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Code Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/code/python/vanilla) ● Videos ▪ [Secure Code Warrior Code Injection Video](https://media.securecodewarrior.com/v2/Module_28_CODE_INJECTION_v2.mp4) ● Further Reading ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Code_Injection)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/mitre.py#L210-L2151 Data Flow/s detected
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/mitre.py#L214Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Code Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/code/python/vanilla) ● Videos ▪ [Secure Code Warrior Code Injection Video](https://media.securecodewarrior.com/v2/Module_28_CODE_INJECTION_v2.mp4) ● Further Reading ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Code_Injection)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/templates/Lab/A9/a9_lab2.html#L53-L581 Data Flow/s detected
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/templates/Lab/A9/a9_lab2.html#L54Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Code Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/code/python/vanilla) ● Videos ▪ [Secure Code Warrior Code Injection Video](https://media.securecodewarrior.com/v2/Module_28_CODE_INJECTION_v2.mp4) ● Further Reading ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Code_Injection)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L504-L5091 Data Flow/s detected
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L507Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Path/Directory Traversal Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/pathtraversal/python/vanilla) ● Videos ▪ [Secure Code Warrior Path/Directory Traversal Video](https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4) ● Further Reading ▪ [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) ▪ [OWASP Input Validation Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L847-L8522 Data Flow/s detected
View Data Flow 1
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L848 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L851 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L852View Data Flow 2
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/apis.py#L22 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/utility.py#L40 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/utility.py#L41 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/utility.py#L46 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/utility.py#L47 [View remaining steps](https://saas.whitesourcesoftware.com/app/orgs/Bens%20Org/scans/7d43b882-a09c-4dc0-ae4e-9d3a77f9e7eb/sast?project=6b1ca1c2-a531-4d88-9cf0-3337265addff&findingSnapshotId=e34b0932-67ab-49cf-993b-c1b43a5af701&filtered=yes) https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/apis.py#L32 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L843 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L848 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L851 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/views.py#L852Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Path/Directory Traversal Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/pathtraversal/python/vanilla) ● Videos ▪ [Secure Code Warrior Path/Directory Traversal Video](https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4) ● Further Reading ▪ [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) ▪ [OWASP Input Validation Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)Vulnerable Code
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/templates/Lab/ssrf/ssrf_lab.html#L52-L571 Data Flow/s detected
https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/templates/Lab/ssrf/ssrf_lab.html#L53 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/templates/Lab/ssrf/ssrf_lab.html#L56 https://github.com/GHCbflam1/pygoat/blob/affedb71685ac183ffee2266c620d9b033f6311a/pygoat/introduction/templates/Lab/ssrf/ssrf_lab.html#L57Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Path/Directory Traversal Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/pathtraversal/python/vanilla) ● Videos ▪ [Secure Code Warrior Path/Directory Traversal Video](https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4) ● Further Reading ▪ [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) ▪ [OWASP Input Validation Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)Findings Overview