Open mend-for-github-com[bot] opened 10 months ago
Latest Scan: 2024-08-05 11:35am Total Findings: 228 | New Findings: 0 | Resolved Findings: 1 Tested Project Files: 3970 Detected Programming Languages: 6 (PHP, Python, C/C++ (Beta), JavaScript / TypeScript, Java, Ruby)
The list below presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the Mend Application.
Code Security Report
Scan Metadata
Latest Scan: 2024-08-05 11:35am Total Findings: 228 | New Findings: 0 | Resolved Findings: 1 Tested Project Files: 3970 Detected Programming Languages: 6 (PHP, Python, C/C++ (Beta), JavaScript / TypeScript, Java, Ruby)
Most Relevant Findings
Automatic Remediation Available (1)
Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/java/sqli-like/src/main/java/com/skf/labs/sqlilike/SqliLikeModel.java#L12-L171 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/java/sqli-like/src/main/java/com/skf/labs/sqlilike/SqliLikeController.java#L17 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/java/sqli-like/src/main/java/com/skf/labs/sqlilike/SqliLikeController.java#L18 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/java/sqli-like/src/main/java/com/skf/labs/sqlilike/SqliLikeModel.java#L15 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/java/sqli-like/src/main/java/com/skf/labs/sqlilike/SqliLikeModel.java#L16 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/java/sqli-like/src/main/java/com/skf/labs/sqlilike/SqliLikeModel.java#L17:rescue_worker_helmet: Remediation Suggestion
https://github.com/SharonKoch/skf-labs/blob/5c3b6df012b28a74ad2c7a1e71165442f4a0e3a6/diffs/fa7a6a64-be40-4456-af6b-0f2ee691559b/SqliLikeModel.java.diff#L1-L30 - [ ] Create Pull Request **Remediation feedback:** - [ ] :thumbsup: Like - [ ] :thumbsdown: DislikeSecure Code Warrior Training Material
● Training ▪ [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla) ● Videos ▪ [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4) ● Further Reading ▪ [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html) ▪ [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection) ▪ [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)No Automatic Remediation (9)
Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD2/app.js#L11-L161 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD2/app.js#L13 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD2/app.js#L15 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD2/app.js#L17 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD2/app.js#L16Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/nodejs/express) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD/app.js#L9-L141 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD/app.js#L12 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD/app.js#L13 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD/app.js#L14Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/nodejs/express) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD-Blind/app.js#L9-L141 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD-Blind/app.js#L12 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD-Blind/app.js#L13 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/CMD-Blind/app.js#L14Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/nodejs/express) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD3/File-upload-cmd.py#L6-L111 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD3/File-upload-cmd.py#L11Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/python/vanilla) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD/CMD.py#L12-L171 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD/CMD.py#L16Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/python/vanilla) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD4/CMD4.py#L19-L241 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD4/CMD4.py#L16 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD4/CMD4.py#L17 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD4/CMD4.py#L18 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD4/CMD4.py#L19 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD4/CMD4.py#L24Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/python/vanilla) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD-Blind/CMD-Blind.py#L12-L171 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD-Blind/CMD-Blind.py#L16Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/python/vanilla) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD2/CMD2.py#L11-L161 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/python/CMD2/CMD2.py#L15Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/python/vanilla) ● Videos ▪ [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4) ● Further Reading ▪ [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)) ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)Vulnerable Code
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/RaceCondition/app.js#L29-L341 Data Flow/s detected
https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/RaceCondition/app.js#L10 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/RaceCondition/app.js#L12 https://github.com/SharonKoch/skf-labs/blob/0eff78b6bc26b88dcc0ae78ecf37c233bdf9ba30/nodeJs/RaceCondition/app.js#L34Secure Code Warrior Training Material
● Training ▪ [Secure Code Warrior Code Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/code/nodejs/express) ● Videos ▪ [Secure Code Warrior Code Injection Video](https://media.securecodewarrior.com/v2/Module_28_CODE_INJECTION_v2.mp4) ● Further Reading ▪ [OWASP Command Injection](https://owasp.org/www-community/attacks/Code_Injection)Findings Overview