forked from contrast-community/spring-petclinic
-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathassess.sarif
1865 lines (1862 loc) · 305 KB
/
assess.sarif
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{
"$schema" : "https://json.schemastore.org/sarif-2.1.0.json",
"version" : "2.1.0",
"runs" : [ {
"tool" : {
"driver" : {
"name" : "Contrast Assess",
"organization" : "Contrast Security, Inc.",
"informationUri" : "https://www.contrastsecurity.com",
"rules" : [ {
"id" : "cookie-header-missing-flags",
"shortDescription" : "Cookie Has No 'secure' Flag",
"fullDescription" : "Cookie Has No 'secure' Flag",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/614.html",
"likelihood" : "High",
"references" : "https://owasp.org/www-community/controls/SecureCookieAttribute",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Cookie Has No 'secure' Flag{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Cookie Has No 'secure' Flag Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Cookie Has No 'secure' Flag Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie in HTTPS\nSession Without 'Secure' Attribute{{/focus}}{{{nl}}} The\nSecure attribute for sensitive cookies in HTTPS sessions is not set,\nwhich could cause the user agent to send those cookies in plaintext over\nan HTTP session. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Cookie Has No 'secure' Flag{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Cookie Has No 'secure' Flag Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Cookie Has No 'secure' Flag Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie in HTTPS\nSession Without 'Secure' Attribute{{/focus}}{{{nl}}} The\nSecure attribute for sensitive cookies in HTTPS sessions is not set,\nwhich could cause the user agent to send those cookies in plaintext over\nan HTTP session. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Secure Communications"
}
}, {
"id" : "redos",
"shortDescription" : "Regular Expression DoS",
"fullDescription" : "Regular Expression DoS",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/405.html",
"likelihood" : "Low",
"references" : "https://en.wikipedia.org/wiki/ReDoS",
"owasp" : "https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS",
"impact" : "High",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Regular Expression DoS{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/dos/regex$$LINK_DELIM$$Secure\nCode Warrior: Regular Expression DoS Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_55_DoS_Regex_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Regular Expression DoS Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Denial of Service - Regular\nExpression DoS{{/focus}}{{{nl}}} Denial of Service (DoS)\nattacks caused by Regular Expression which causes the system to hang or\ncause them to work very slowly when attacker sends a well-crafted\ninput(exponentially related to input size).Denial of service attacks\nsignificantly degrade the service quality experienced by legitimate\nusers. These attacks introduce large response delays, excessive losses,\nand service interruptions, resulting in direct impact on availability.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Regular Expression DoS{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/dos/regex$$LINK_DELIM$$Secure\nCode Warrior: Regular Expression DoS Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_55_DoS_Regex_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Regular Expression DoS Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Denial of Service - Regular\nExpression DoS{{/focus}}{{{nl}}} Denial of Service (DoS)\nattacks caused by Regular Expression which causes the system to hang or\ncause them to work very slowly when attacker sends a well-crafted\ninput(exponentially related to input size).Denial of service attacks\nsignificantly degrade the service quality experienced by legitimate\nusers. These attacks introduce large response delays, excessive losses,\nand service interruptions, resulting in direct impact on availability.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "hardcoded-key",
"shortDescription" : "Hardcoded Cryptographic Key",
"fullDescription" : "Hardcoded Cryptographic Key",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/321.html",
"likelihood" : "Low",
"references" : "https://www.securecoding.cert.org/confluence/display/java/MSC03-J.+Never+hard+code+sensitive+information\nhttps://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html",
"owasp" : "https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html#key-storage",
"impact" : "High",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Hardcoded Cryptographic Key{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/crypto/exposedkey$$LINK_DELIM$$Secure\nCode Warrior: Hardcoded Cryptographic Key Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_126_exposed_key.mp4$$LINK_DELIM$$Secure\nCode Warrior: Hardcoded Cryptographic Key Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Use of Hard-coded\nCryptographic Key{{/focus}}{{{nl}}} The use of a\nhard-coded cryptographic key significantly increases the possibility\nthat encrypted data may be recovered. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Hardcoded Cryptographic Key{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/crypto/exposedkey$$LINK_DELIM$$Secure\nCode Warrior: Hardcoded Cryptographic Key Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_126_exposed_key.mp4$$LINK_DELIM$$Secure\nCode Warrior: Hardcoded Cryptographic Key Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Use of Hard-coded\nCryptographic Key{{/focus}}{{{nl}}} The use of a\nhard-coded cryptographic key significantly increases the possibility\nthat encrypted data may be recovered. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Cryptography"
}
}, {
"id" : "role-manager-protection",
"shortDescription" : "Role Manager Protection Mode",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/306.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.security.roles.cookieprotectionvalue.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"custom references" : {
"text" : "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html\n",
"formattedTextVariables" : { },
"formattedText" : "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html{{{nl}}}"
},
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Role Manager Protection Mode{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/auth/missingauth$$LINK_DELIM$$Secure\nCode Warrior: Role Manager Protection Mode Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_128_improper_authentication.mp4$$LINK_DELIM$$Secure\nCode Warrior: Role Manager Protection Mode Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Missing Authentication for\nCritical Function{{/focus}}{{{nl}}} The software does\nnot perform any authentication for functionality that requires a\nprovable user identity or consumes a significant amount of resources.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Role Manager Protection Mode{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/auth/missingauth$$LINK_DELIM$$Secure\nCode Warrior: Role Manager Protection Mode Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_128_improper_authentication.mp4$$LINK_DELIM$$Secure\nCode Warrior: Role Manager Protection Mode Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Missing Authentication for\nCritical Function{{/focus}}{{{nl}}} The software does\nnot perform any authentication for functionality that requires a\nprovable user identity or consumes a significant amount of resources.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Access Control"
}
}, {
"id" : "hsts-header-missing",
"shortDescription" : "Response With Insecurely Configured Strict-Transport-Security Header",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/319.html",
"likelihood" : "Low",
"references" : "https://wiki.owasp.org/index.php/HTTP_Strict_Transport_Security_Cheat_Sheet",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Response With Insecurely Configured Strict-Transport-Security\nHeader{{/focus}} vulnerabilities over on the Secure Code Warrior\nplatform by watching videos and completing training exercises and\nmissions that focus on secure coding.{{/paragraph}} {{#unorderedList}}\n{{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/itlp/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Response With Insecurely Configured\nStrict-Transport-Security Header Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_200_unprotected_transport_of_sensitive_information.mp4$$LINK_DELIM$$Secure\nCode Warrior: Response With Insecurely Configured\nStrict-Transport-Security Header Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Cleartext Transmission of\nSensitive Information{{/focus}}{{{nl}}} The software\ntransmits sensitive or security-critical data in cleartext in a\ncommunication channel that can be sniffed by unauthorized actors.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Response With Insecurely Configured Strict-Transport-Security\nHeader{{/focus}} vulnerabilities over on the Secure Code Warrior\nplatform by watching videos and completing training exercises and\nmissions that focus on secure coding.{{/paragraph}} {{#unorderedList}}\n{{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/itlp/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Response With Insecurely Configured\nStrict-Transport-Security Header Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_200_unprotected_transport_of_sensitive_information.mp4$$LINK_DELIM$$Secure\nCode Warrior: Response With Insecurely Configured\nStrict-Transport-Security Header Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Cleartext Transmission of\nSensitive Information{{/focus}}{{{nl}}} The software\ntransmits sensitive or security-critical data in cleartext in a\ncommunication channel that can be sniffed by unauthorized actors.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Secure Communications"
}
}, {
"id" : "wcf-exception-details",
"shortDescription" : "WCF Exception Details",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/215.html",
"likelihood" : "High",
"references" : "https://msdn.microsoft.com/en-us/library/system.servicemodel.servicebehaviorattribute.includeexceptiondetailinfaults(v=vs.110).aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}WCF Exception Details{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/debuginfo$$LINK_DELIM$$Secure\nCode Warrior: WCF Exception Details Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_82_DEBUG_INFORMATION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: WCF Exception Details Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Insertion of Sensitive\nInformation Into Debugging Code{{/focus}}{{{nl}}} The\napplication inserts sensitive information into debugging code, which\ncould expose this information if the debugging code is not disabled in\nproduction. {{/grayedData}} {{/blockQuote}} {{!--\nend SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}WCF Exception Details{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/debuginfo$$LINK_DELIM$$Secure\nCode Warrior: WCF Exception Details Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_82_DEBUG_INFORMATION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: WCF Exception Details Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Insertion of Sensitive\nInformation Into Debugging Code{{/focus}}{{{nl}}} The\napplication inserts sensitive information into debugging code, which\ncould expose this information if the debugging code is not disabled in\nproduction. {{/grayedData}} {{/blockQuote}} {{!--\nend SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "wcf-metadata-enabled",
"shortDescription" : "WCF Service Metadata Enabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/651.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/System.ServiceModel.Description.ServiceMetadataBehavior_properties(v=vs.110).aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}WCF Service Metadata Enabled{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/misconfig$$LINK_DELIM$$Secure\nCode Warrior: WCF Service Metadata Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_81_SECURITY_MISCONFIGURATION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: WCF Service Metadata Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Information Exposure -\nSecurity Misconfiguration{{/focus}}{{{nl}}} Information\nexposure can occur as a result of security misconfiguration, typically\ndue to poor or no security configuration. Common examples of this\ninclude accidental deployment of test environment configuration to\nproduction systems, lack of error handling configured resulting in full\nerror details being shown to users, and poor directory configuration\nallowing files to be accessible when they should not be.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}WCF Service Metadata Enabled{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/misconfig$$LINK_DELIM$$Secure\nCode Warrior: WCF Service Metadata Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_81_SECURITY_MISCONFIGURATION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: WCF Service Metadata Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Information Exposure -\nSecurity Misconfiguration{{/focus}}{{{nl}}} Information\nexposure can occur as a result of security misconfiguration, typically\ndue to poor or no security configuration. Common examples of this\ninclude accidental deployment of test environment configuration to\nproduction systems, lack of error handling configured resulting in full\nerror details being shown to users, and poor directory configuration\nallowing files to be accessible when they should not be.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "unvalidated-forward",
"shortDescription" : "Arbitrary Server Side Forwards",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/441.html",
"likelihood" : "Medium",
"references" : "https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html\nhttps://blog.gdssecurity.com/labs/2011/9/9/net-servertransfer-vs-responseredirect-reiterating-a-securit.html",
"owasp" : "https://owasp.org/Top10/A01_2021-Broken_Access_Control/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Arbitrary Server Side Forwards{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/uraf/generic$$LINK_DELIM$$Secure\nCode Warrior: Arbitrary Server Side Forwards Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Unvalidated_Redirects_and_Forwards_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Arbitrary Server Side Forwards Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Unvalidated Redirects and\nForwards - Unvalidated Redirects and Forwards{{/focus}}{{{nl}}}\nThis vulnerability refers to the ability of an attacker to arbitrarily\nperform a redirection (external) or forward (internal) against the\nsystem. It arises due to insufficient validation or sanitisation of\ninputs used to perform a redirect or forward and may result in privilege\nescalation (in the case of a forward) or may be used to launch phishing\nattacks against users (in the case of redirects).\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Arbitrary Server Side Forwards{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/uraf/generic$$LINK_DELIM$$Secure\nCode Warrior: Arbitrary Server Side Forwards Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Unvalidated_Redirects_and_Forwards_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Arbitrary Server Side Forwards Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Unvalidated Redirects and\nForwards - Unvalidated Redirects and Forwards{{/focus}}{{{nl}}}\nThis vulnerability refers to the ability of an attacker to arbitrarily\nperform a redirection (external) or forward (internal) against the\nsystem. It arises due to insufficient validation or sanitisation of\ninputs used to perform a redirect or forward and may result in privilege\nescalation (in the case of a forward) or may be used to launch phishing\nattacks against users (in the case of redirects).\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Access Control"
}
}, {
"id" : "cache-controls-missing",
"shortDescription" : "Anti-Caching Controls Missing",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/525.html",
"likelihood" : "Low",
"references" : "",
"owasp" : "https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/04-Authentication_Testing/06-Testing_for_Browser_Cache_Weaknesses",
"impact" : "Low",
"confidence level" : 1,
"category" : "Caching"
}
}, {
"id" : "header-injection",
"shortDescription" : "Header Injection",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/113.html",
"likelihood" : "High",
"references" : "https://owasp.org/www-community/vulnerabilities/CRLF_Injection",
"owasp" : "https://owasp.org/Top10/A03_2021-Injection/",
"impact" : "Medium",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Header Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/http$$LINK_DELIM$$Secure\nCode Warrior: Header Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_24_CRLF_INJECTION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Header Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nCRLF Sequences in HTTP Headers ('HTTP Request/Response\nSplitting'){{/focus}}{{{nl}}} When an HTTP request\ncontains unexpected CR and LF characters, the server may respond with an\noutput stream that is interpreted as “splitting” the stream into two\ndifferent HTTP messages instead of one. CR is carriage return, also\ngiven by %0d or \\r, and LF is line feed, also given by %0a or \\n. In\naddition to CR and LF characters, other valid/RFC compliant special\ncharacters and unique character encodings can be utilized, such as HT\n(horizontal tab, also given by %09 or \\t) and SP (space, also given as +\nsign or %20). These types of unvalidated and unexpected data in HTTP\nmessage headers allow an attacker to control the second\n"split" message to mount attacks such as server-side request\nforgery, cross-site scripting, and cache poisoning attacks.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Header Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/http$$LINK_DELIM$$Secure\nCode Warrior: Header Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_24_CRLF_INJECTION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Header Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nCRLF Sequences in HTTP Headers ('HTTP Request/Response\nSplitting'){{/focus}}{{{nl}}} When an HTTP request\ncontains unexpected CR and LF characters, the server may respond with an\noutput stream that is interpreted as “splitting” the stream into two\ndifferent HTTP messages instead of one. CR is carriage return, also\ngiven by %0d or \\r, and LF is line feed, also given by %0a or \\n. In\naddition to CR and LF characters, other valid/RFC compliant special\ncharacters and unique character encodings can be utilized, such as HT\n(horizontal tab, also given by %09 or \\t) and SP (space, also given as +\nsign or %20). These types of unvalidated and unexpected data in HTTP\nmessage headers allow an attacker to control the second\n"split" message to mount attacks such as server-side request\nforgery, cross-site scripting, and cache poisoning attacks.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "viewstate-mac-disabled",
"shortDescription": {
"text": "Viewstate MAC Validation Disabled - short"
},
"fullDescription": {
"text": "Viewstate MAC Validation Disabled - long"
},
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"enabled" : "true",
"cwe" : "https://cwe.mitre.org/data/definitions/20.html",
"likelihood" : "High",
"references" : "https://msdn.microsoft.com/en-us/library/950xf363(v=vs.100).aspx\nhttps://msdn.microsoft.com/en-us/library/system.web.ui.page.enableviewstatemac.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Viewstate MAC Validation Disabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Viewstate MAC Validation Disabled\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Viewstate MAC Validation Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Security Misconfiguration -\nDisabled Security Features{{/focus}}{{{nl}}} This\nvulnerability refers to a mistake or lack of environment identification\ncapabilities that could lead to certain security features being disabled\n(e.g.: access-control). Having such features disabled in a production\nenvironment would leave an application running exclusively on\nsecurity-through-obscurity (simply hiding menu options and such like)\nthat should not be considered of security value.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Viewstate MAC Validation Disabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Viewstate MAC Validation Disabled\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Viewstate MAC Validation Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Security Misconfiguration -\nDisabled Security Features{{/focus}}{{{nl}}} This\nvulnerability refers to a mistake or lack of environment identification\ncapabilities that could lead to certain security features being disabled\n(e.g.: access-control). Having such features disabled in a production\nenvironment would leave an application running exclusively on\nsecurity-through-obscurity (simply hiding menu options and such like)\nthat should not be considered of security value.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "hql-injection",
"name" : "Hibernate Injection (name)",
"shortDescription": {
"text": "Hibernate Injection - short"
},
"fullDescription": {
"text": "Hibernate Injection - long"
},
"helpUri" : "https://github.com/Contrast-Security-OSS/adr-runbooks/blob/main/_runbooks/sql-injection.md",
"defaultConfiguration": {},
"properties": {
"tags": [
"maintainability"
],
"kind": "problem",
"precision": "very-high",
"id": "js/unused-local-variable-1",
"problem.severity": "recommendation",
"cwe" : "https://cwe.mitre.org/data/definitions/564.html",
"likelihood" : "High",
"references" : "https://owasp.org/www-community/Hibernate\nhttps://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html",
"owasp" : "https://owasp.org/Top10/A03_2021-Injection/",
"custom references" : {
"text" : "https://owasp.org/www-community/attacks/SQL_Injection\nhttps://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-community/attacks/SQL_Injection{{{nl}}}https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html{{{nl}}}"
},
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Hibernate Injection{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/sql$$LINK_DELIM$$Secure\nCode Warrior: Hibernate Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4$$LINK_DELIM$$Secure\nCode Warrior: Hibernate Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Injection Flaws - SQL\nInjection{{/focus}}{{{nl}}} This is probably one of the\ntwo most exploited vulnerabilities in web applications and has led to a\nnumber of high profile company breaches. It occurs when an application\nfails to sanitize or validate input before using it to dynamically\nconstruct a statement. An attacker that exploits this vulnerability will\nbe able to gain access to the underlying database and view or modify\ndata without permission. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Hibernate Injection{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/sql$$LINK_DELIM$$Secure\nCode Warrior: Hibernate Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4$$LINK_DELIM$$Secure\nCode Warrior: Hibernate Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Injection Flaws - SQL\nInjection{{/focus}}{{{nl}}} This is probably one of the\ntwo most exploited vulnerabilities in web applications and has led to a\nnumber of high profile company breaches. It occurs when an application\nfails to sanitize or validate input before using it to dynamically\nconstruct a statement. An attacker that exploits this vulnerability will\nbe able to gain access to the underlying database and view or modify\ndata without permission. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "version-header-enabled",
"shortDescription" : "Version Header Enabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/200.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.httpruntimesection.enableversionheader.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"custom references" : {
"text" : "https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure\nhttps://owasp.org/www-project-proactive-controls/v3/en/c8-protect-data-everywhere\nhttps://owasp.org/Top10/A02_2021-Cryptographic_Failures/\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure{{{nl}}}https://owasp.org/www-project-proactive-controls/v3/en/c8-protect-data-everywhere{{{nl}}}https://owasp.org/Top10/A02_2021-Cryptographic_Failures/{{{nl}}}"
},
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Version Header Enabled{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Version Header Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_57_sensitive_data_exposure.mp4$$LINK_DELIM$$Secure\nCode Warrior: Version Header Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Exposure of Sensitive\nInformation to an Unauthorized Actor{{/focus}}{{{nl}}} The product\nexposes sensitive information to an actor that is not explicitly\nauthorized to have access to that information. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Version Header Enabled{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Version Header Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_57_sensitive_data_exposure.mp4$$LINK_DELIM$$Secure\nCode Warrior: Version Header Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Exposure of Sensitive\nInformation to an Unauthorized Actor{{/focus}}{{{nl}}} The product\nexposes sensitive information to an actor that is not explicitly\nauthorized to have access to that information. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "stored-xss",
"shortDescription" : "Stored Cross-Site Scripting",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/79.html",
"likelihood" : "High",
"references" : "https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html",
"owasp" : "https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_Scripting",
"custom references" : {
"text" : "https://owasp.org/www-community/attacks/xss/\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-community/attacks/xss/{{{nl}}}"
},
"impact" : "Medium",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Stored Cross-Site Scripting{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/xss$$LINK_DELIM$$Secure\nCode Warrior: Stored Cross-Site Scripting Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_71_Cross+Site+Scripting_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Stored Cross-Site Scripting Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nInput During Web Page Generation ('Cross-site\nScripting'){{/focus}}{{{nl}}} The software does not\nneutralize or incorrectly neutralizes user-controllable input before it\nis placed in output that is used as a web page that is served to other\nusers. {{/grayedData}} {{/blockQuote}} {{!-- end\nSCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Stored Cross-Site Scripting{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/xss$$LINK_DELIM$$Secure\nCode Warrior: Stored Cross-Site Scripting Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_71_Cross+Site+Scripting_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Stored Cross-Site Scripting Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nInput During Web Page Generation ('Cross-site\nScripting'){{/focus}}{{{nl}}} The software does not\nneutralize or incorrectly neutralizes user-controllable input before it\nis placed in output that is used as a web page that is served to other\nusers. {{/grayedData}} {{/blockQuote}} {{!-- end\nSCW integration block --}}"
},
"category" : "XSS"
}
}, {
"id" : "event-validation-disabled",
"shortDescription" : "Event Validation Disabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/20.html",
"likelihood" : "High",
"references" : "https://msdn.microsoft.com/en-us/library/y123fsf7.aspx\nhttps://msdn.microsoft.com/en-us/library/system.web.ui.page.enableeventvalidation.aspx",
"owasp" : "https://owasp.org/Top10/A03_2021-Injection/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Event Validation Disabled{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Event Validation Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Event Validation Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Security Misconfiguration -\nDisabled Security Features{{/focus}}{{{nl}}} This\nvulnerability refers to a mistake or lack of environment identification\ncapabilities that could lead to certain security features being disabled\n(e.g.: access-control). Having such features disabled in a production\nenvironment would leave an application running exclusively on\nsecurity-through-obscurity (simply hiding menu options and such like)\nthat should not be considered of security value.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Event Validation Disabled{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Event Validation Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Event Validation Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Security Misconfiguration -\nDisabled Security Features{{/focus}}{{{nl}}} This\nvulnerability refers to a mistake or lack of environment identification\ncapabilities that could lead to certain security features being disabled\n(e.g.: access-control). Having such features disabled in a production\nenvironment would leave an application running exclusively on\nsecurity-through-obscurity (simply hiding menu options and such like)\nthat should not be considered of security value.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "untrusted-deserialization",
"shortDescription" : "Untrusted Deserialization",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/502.html",
"likelihood" : "Medium",
"references" : "https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/\nhttps://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html",
"owasp" : "https://owasp.org/Top10/A08_2021-Software_and_Data_Integrity_Failures/",
"custom references" : {
"text" : "https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html\nhttps://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data\n",
"formattedTextVariables" : { },
"formattedText" : "https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html{{{nl}}}https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data{{{nl}}}"
},
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Untrusted Deserialization{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/deserialization$$LINK_DELIM$$Secure\nCode Warrior: Untrusted Deserialization Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_62_Insecure_Deserialization_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Untrusted Deserialization Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Deserialization of Untrusted\nData{{/focus}}{{{nl}}} The application deserializes\nuntrusted data without sufficiently verifying that the resulting data\nwill be valid. {{/grayedData}} {{/blockQuote}} {{!--\nend SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Untrusted Deserialization{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/deserialization$$LINK_DELIM$$Secure\nCode Warrior: Untrusted Deserialization Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_62_Insecure_Deserialization_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Untrusted Deserialization Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Deserialization of Untrusted\nData{{/focus}}{{{nl}}} The application deserializes\nuntrusted data without sufficiently verifying that the resulting data\nwill be valid. {{/grayedData}} {{/blockQuote}} {{!--\nend SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "role-manager-ssl",
"shortDescription" : "Role Manager SSL",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/319.html",
"likelihood" : "Low",
"references" : "https://docs.microsoft.com/en-us/dotnet/api/system.web.security.roles.cookierequiressl",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Role Manager SSL{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/itlp/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Role Manager SSL Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_200_unprotected_transport_of_sensitive_information.mp4$$LINK_DELIM$$Secure\nCode Warrior: Role Manager SSL Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Cleartext Transmission of\nSensitive Information{{/focus}}{{{nl}}} The software\ntransmits sensitive or security-critical data in cleartext in a\ncommunication channel that can be sniffed by unauthorized actors.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Role Manager SSL{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/itlp/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Role Manager SSL Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_200_unprotected_transport_of_sensitive_information.mp4$$LINK_DELIM$$Secure\nCode Warrior: Role Manager SSL Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Cleartext Transmission of\nSensitive Information{{/focus}}{{{nl}}} The software\ntransmits sensitive or security-critical data in cleartext in a\ncommunication channel that can be sniffed by unauthorized actors.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Access Control"
}
}, {
"id" : "trust-boundary-violation",
"shortDescription" : "Trust Boundary Violation",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/501.html",
"likelihood" : "Medium",
"references" : "https://owasp.org/Top10/A04_2021-Insecure_Design/",
"owasp" : "https://owasp.org/Top10/A04_2021-Insecure_Design/",
"impact" : "Medium",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Trust Boundary Violation{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/blog/generic$$LINK_DELIM$$Secure\nCode Warrior: Trust Boundary Violation Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Business_Logic_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Trust Boundary Violation Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Business Logic - Logical\nError{{/focus}}{{{nl}}} Incorrect implementation of\nbusiness logic rules can be the cause of subtle but serious\nvulnerabilities. Depending on the purpose and functionality implemented\nwithin the application, it may allow privilege escalation or unintended\nbusiness processes to be performed. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Trust Boundary Violation{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/blog/generic$$LINK_DELIM$$Secure\nCode Warrior: Trust Boundary Violation Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Business_Logic_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Trust Boundary Violation Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Business Logic - Logical\nError{{/focus}}{{{nl}}} Incorrect implementation of\nbusiness logic rules can be the cause of subtle but serious\nvulnerabilities. Depending on the purpose and functionality implemented\nwithin the application, it may allow privilege escalation or unintended\nbusiness processes to be performed. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "path-traversal",
"shortDescription" : "Path Traversal",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/22.html",
"likelihood" : "Medium",
"references" : "",
"owasp" : "https://owasp.org/www-community/attacks/Path_Traversal",
"custom references" : {
"text" : "https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html\n",
"formattedTextVariables" : { },
"formattedText" : "https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html{{{nl}}}"
},
"impact" : "High",
"confidence level" : 2,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Path Traversal{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/pathtraversal$$LINK_DELIM$$Secure\nCode Warrior: Path Traversal Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4$$LINK_DELIM$$Secure\nCode Warrior: Path Traversal Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Limitation of a Pathname to a Restricted Directory\n('Path Traversal'){{/focus}}{{{nl}}} The software uses external input to\nconstruct a pathname that should be within a restricted directory, but\nit does not properly neutralize sequences such as ".." that\ncan resolve to a location that is outside of that directory.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Path Traversal{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/pathtraversal$$LINK_DELIM$$Secure\nCode Warrior: Path Traversal Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_196_path_traversal.mp4$$LINK_DELIM$$Secure\nCode Warrior: Path Traversal Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Limitation of a Pathname to a Restricted Directory\n('Path Traversal'){{/focus}}{{{nl}}} The software uses external input to\nconstruct a pathname that should be within a restricted directory, but\nit does not properly neutralize sequences such as ".." that\ncan resolve to a location that is outside of that directory.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "unsafe-code-execution",
"shortDescription" : "Unsafe Code Execution",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/95.html",
"likelihood" : "Medium",
"references" : "https://owasp.org/www-community/attacks/Code_Injection",
"owasp" : "https://owasp.org/Top10/A04_2021-Insecure_Design/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Unsafe Code Execution{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/code$$LINK_DELIM$$Secure\nCode Warrior: Unsafe Code Execution Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_28_CODE_INJECTION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Unsafe Code Execution Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Injection Flaws - Code\nInjection{{/focus}}{{{nl}}} Code injection happens when\nan application insecurely accepts input that is subsequently used in a\ndynamic code evaluation call. If insufficient validation or sanitisation\nis performed on the input, specially crafted inputs may be able to alter\nthe syntax of the evaluated code and thus alter execution. In a worst\ncase scenario, an attacker could run arbitrary code in the server\ncontext and thus perform almost any action on the application server.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Unsafe Code Execution{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/code$$LINK_DELIM$$Secure\nCode Warrior: Unsafe Code Execution Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_28_CODE_INJECTION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Unsafe Code Execution Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Injection Flaws - Code\nInjection{{/focus}}{{{nl}}} Code injection happens when\nan application insecurely accepts input that is subsequently used in a\ndynamic code evaluation call. If insufficient validation or sanitisation\nis performed on the input, specially crafted inputs may be able to alter\nthe syntax of the evaluated code and thus alter execution. In a worst\ncase scenario, an attacker could run arbitrary code in the server\ncontext and thus perform almost any action on the application server.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "unvalidated-redirect",
"shortDescription" : "Unvalidated Redirect",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/601.html",
"likelihood" : "Medium",
"references" : "https://owasp.org/Top10/A01_2021-Broken_Access_Control/",
"owasp" : "https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html",
"impact" : "Medium",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Unvalidated Redirect{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/uraf/generic$$LINK_DELIM$$Secure\nCode Warrior: Unvalidated Redirect Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Unvalidated_Redirects_and_Forwards_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Unvalidated Redirect Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}URL Redirection to Untrusted\nSite ('Open Redirect'){{/focus}}{{{nl}}} A web\napplication accepts a user-controlled input that specifies a link to an\nexternal site, and uses that link in a Redirect. This simplifies\nphishing attacks. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Unvalidated Redirect{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/uraf/generic$$LINK_DELIM$$Secure\nCode Warrior: Unvalidated Redirect Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Unvalidated_Redirects_and_Forwards_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Unvalidated Redirect Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}URL Redirection to Untrusted\nSite ('Open Redirect'){{/focus}}{{{nl}}} A web\napplication accepts a user-controlled input that specifies a link to an\nexternal site, and uses that link in a Redirect. This simplifies\nphishing attacks. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "autocomplete-missing",
"shortDescription" : "Forms Without Autocomplete Prevention",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/525.html",
"likelihood" : "Low",
"references" : "https://owasp.org/Top10/A04_2021-Insecure_Design/",
"owasp" : "https://owasp.org/Top10/A04_2021-Insecure_Design/",
"impact" : "Low",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Forms Without Autocomplete Prevention{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/sidechannel/url_cache$$LINK_DELIM$$Secure\nCode Warrior: Forms Without Autocomplete Prevention\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_193_url_caching.mp4$$LINK_DELIM$$Secure\nCode Warrior: Forms Without Autocomplete Prevention\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Use of Web Browser Cache Containing Sensitive\nInformation{{/focus}}{{{nl}}} The web application does\nnot use an appropriate caching policy that specifies the extent to which\neach web page and associated form fields should be cached.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Forms Without Autocomplete Prevention{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/sidechannel/url_cache$$LINK_DELIM$$Secure\nCode Warrior: Forms Without Autocomplete Prevention\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_193_url_caching.mp4$$LINK_DELIM$$Secure\nCode Warrior: Forms Without Autocomplete Prevention\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Use of Web Browser Cache Containing Sensitive\nInformation{{/focus}}{{{nl}}} The web application does\nnot use an appropriate caching policy that specifies the extent to which\neach web page and associated form fields should be cached.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Caching"
}
}, {
"id" : "xxe",
"shortDescription" : "XML External Entity Injection (XXE)",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/611.html",
"likelihood" : "Medium",
"references" : "https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html",
"owasp" : "https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}XML External Entity Injection (XXE){{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/xxe/generic$$LINK_DELIM$$Secure\nCode Warrior: XML External Entity Injection (XXE)\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_23_XML_External_Entity_Injection_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: XML External Entity Injection (XXE) Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Restriction of XML\nExternal Entity Reference{{/focus}}{{{nl}}} The software\nprocesses an XML document that can contain XML entities with URIs that\nresolve to documents outside of the intended sphere of control, causing\nthe product to embed incorrect documents into its output.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}XML External Entity Injection (XXE){{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/xxe/generic$$LINK_DELIM$$Secure\nCode Warrior: XML External Entity Injection (XXE)\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_23_XML_External_Entity_Injection_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: XML External Entity Injection (XXE) Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Restriction of XML\nExternal Entity Reference{{/focus}}{{{nl}}} The software\nprocesses an XML document that can contain XML entities with URIs that\nresolve to documents outside of the intended sphere of control, causing\nthe product to embed incorrect documents into its output.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "authorization-rules-misordered",
"shortDescription" : "Authorization Rules Misordered",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/284.html",
"likelihood" : "Medium",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.authorizationsection.aspx",
"owasp" : "https://owasp.org/Top10/A01_2021-Broken_Access_Control/",
"impact" : "Medium",
"confidence level" : 2,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Authorization Rules Misordered{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/access$$LINK_DELIM$$Secure\nCode Warrior: Authorization Rules Misordered Training{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Access\nControl{{/focus}}{{{nl}}} The software does not restrict\nor incorrectly restricts access to a resource from an unauthorized\nactor. {{/grayedData}} {{/blockQuote}} {{!-- end\nSCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Authorization Rules Misordered{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/access$$LINK_DELIM$$Secure\nCode Warrior: Authorization Rules Misordered Training{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Access\nControl{{/focus}}{{{nl}}} The software does not restrict\nor incorrectly restricts access to a resource from an unauthorized\nactor. {{/grayedData}} {{/blockQuote}} {{!-- end\nSCW integration block --}}"
},
"category" : "Access Control"
}
}, {
"id" : "smtp-injection",
"shortDescription" : "SMTP Injection",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/77.html",
"likelihood" : "Medium",
"references" : "https://www.owasp.org/index.php/Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)",
"owasp" : "https://owasp.org/Top10/A03_2021-Injection/",
"custom references" : {
"text" : "https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)\n",
"formattedTextVariables" : { },
"formattedText" : "https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013){{{nl}}}"
},
"impact" : "Medium",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}SMTP Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/oscmd$$LINK_DELIM$$Secure\nCode Warrior: SMTP Injection Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: SMTP Injection Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Neutralization of Special Elements used in a Command\n('Command Injection'){{/focus}}{{{nl}}} The software\nconstructs all or part of a command using externally-influenced input\nfrom an upstream component, but it does not neutralize or incorrectly\nneutralizes special elements that could modify the intended command when\nit is sent to a downstream component. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}SMTP Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/oscmd$$LINK_DELIM$$Secure\nCode Warrior: SMTP Injection Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: SMTP Injection Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Neutralization of Special Elements used in a Command\n('Command Injection'){{/focus}}{{{nl}}} The software\nconstructs all or part of a command using externally-influenced input\nfrom an upstream component, but it does not neutralize or incorrectly\nneutralizes special elements that could modify the intended command when\nit is sent to a downstream component. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "ldap-injection",
"shortDescription" : "LDAP Injection",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/90.html",
"likelihood" : "Medium",
"references" : "https://wiki.owasp.org/index.php/LDAP_injection",
"owasp" : "https://owasp.org/Top10/A03_2021-Injection/",
"custom references" : {
"text" : "https://ldap.com/2018/05/04/understanding-and-defending-against-ldap-injection-attacks/\nhttps://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html\n",
"formattedTextVariables" : { },
"formattedText" : "https://ldap.com/2018/05/04/understanding-and-defending-against-ldap-injection-attacks/{{{nl}}}https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html{{{nl}}}"
},
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}LDAP Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/ldap$$LINK_DELIM$$Secure\nCode Warrior: LDAP Injection Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/LDAP_Injection_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: LDAP Injection Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Neutralization of Special Elements used in an LDAP\nQuery ('LDAP Injection'){{/focus}}{{{nl}}} The software\nconstructs all or part of an LDAP query using externally-influenced\ninput from an upstream component, but it does not neutralize or\nincorrectly neutralizes special elements that could modify the intended\nLDAP query when it is sent to a downstream component.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}LDAP Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/ldap$$LINK_DELIM$$Secure\nCode Warrior: LDAP Injection Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/LDAP_Injection_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: LDAP Injection Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Neutralization of Special Elements used in an LDAP\nQuery ('LDAP Injection'){{/focus}}{{{nl}}} The software\nconstructs all or part of an LDAP query using externally-influenced\ninput from an upstream component, but it does not neutralize or\nincorrectly neutralizes special elements that could modify the intended\nLDAP query when it is sent to a downstream component.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "insecure-auth-protocol",
"shortDescription" : "Insecure Authentication Protocol",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/287.html",
"likelihood" : "Medium",
"references" : "https://wiki.owasp.org/index.php/Insecure_Configuration_Management",
"owasp" : "https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/",
"custom references" : {
"text" : "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html\n",
"formattedTextVariables" : { },
"formattedText" : "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html{{{nl}}}"
},
"impact" : "Medium",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Insecure Authentication Protocol{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/auth/missingauth$$LINK_DELIM$$Secure\nCode Warrior: Insecure Authentication Protocol Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_128_improper_authentication.mp4$$LINK_DELIM$$Secure\nCode Warrior: Insecure Authentication Protocol Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper\nAuthentication{{/focus}}{{{nl}}} When an actor claims to\nhave a given identity, the software does not prove or insufficiently\nproves that the claim is correct. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Insecure Authentication Protocol{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/auth/missingauth$$LINK_DELIM$$Secure\nCode Warrior: Insecure Authentication Protocol Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_128_improper_authentication.mp4$$LINK_DELIM$$Secure\nCode Warrior: Insecure Authentication Protocol Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper\nAuthentication{{/focus}}{{{nl}}} When an actor claims to\nhave a given identity, the software does not prove or insufficiently\nproves that the claim is correct. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Access Control"
}
}, {
"id" : "secure-flag-missing",
"shortDescription" : "Session Cookie Has No 'secure' Flag",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/614.html",
"likelihood" : "High",
"references" : "https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Session Cookie Has No 'secure' Flag{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'secure' Flag\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'secure' Flag Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie in HTTPS\nSession Without 'Secure' Attribute{{/focus}}{{{nl}}} The\nSecure attribute for sensitive cookies in HTTPS sessions is not set,\nwhich could cause the user agent to send those cookies in plaintext over\nan HTTP session. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Session Cookie Has No 'secure' Flag{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'secure' Flag\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'secure' Flag Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie in HTTPS\nSession Without 'Secure' Attribute{{/focus}}{{{nl}}} The\nSecure attribute for sensitive cookies in HTTPS sessions is not set,\nwhich could cause the user agent to send those cookies in plaintext over\nan HTTP session. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Session Management"
}
}, {
"id" : "expression-language-injection",
"shortDescription" : "Expression Language Injection",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/88.html",
"likelihood" : "Medium",
"references" : "https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection",
"owasp" : "https://owasp.org/Top10/A03_2021-Injection/",
"custom references" : {
"text" : "https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)\n",
"formattedTextVariables" : { },
"formattedText" : "https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013){{{nl}}}"
},
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Expression Language Injection{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/oscmd$$LINK_DELIM$$Secure\nCode Warrior: Expression Language Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Expression Language Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nArgument Delimiters in a Command ('Argument\nInjection'){{/focus}}{{{nl}}} The software constructs a\nstring for a command to executed by a separate component in another\ncontrol sphere, but it does not properly delimit the intended arguments,\noptions, or switches within that command string. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Expression Language Injection{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/oscmd$$LINK_DELIM$$Secure\nCode Warrior: Expression Language Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Expression Language Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nArgument Delimiters in a Command ('Argument\nInjection'){{/focus}}{{{nl}}} The software constructs a\nstring for a command to executed by a separate component in another\ncontrol sphere, but it does not properly delimit the intended arguments,\noptions, or switches within that command string. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "forms-auth-ssl",
"shortDescription" : "Forms Authentication SSL",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/319.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.formsauthenticationconfiguration.requiressl.aspx",
"owasp" : "https://owasp.org/Top10/A02_2021-Cryptographic_Failures/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Forms Authentication SSL{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/itlp/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Forms Authentication SSL Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_200_unprotected_transport_of_sensitive_information.mp4$$LINK_DELIM$$Secure\nCode Warrior: Forms Authentication SSL Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Cleartext Transmission of\nSensitive Information{{/focus}}{{{nl}}} The software\ntransmits sensitive or security-critical data in cleartext in a\ncommunication channel that can be sniffed by unauthorized actors.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Forms Authentication SSL{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/itlp/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: Forms Authentication SSL Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_200_unprotected_transport_of_sensitive_information.mp4$$LINK_DELIM$$Secure\nCode Warrior: Forms Authentication SSL Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Cleartext Transmission of\nSensitive Information{{/focus}}{{{nl}}} The software\ntransmits sensitive or security-critical data in cleartext in a\ncommunication channel that can be sniffed by unauthorized actors.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Authentication"
}
}, {
"id" : "max-request-length",
"shortDescription" : "Large Max Request Length",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/400.html",
"likelihood" : "High",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.httpruntimesection.maxrequestlength.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Large Max Request Length{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/dos/routing$$LINK_DELIM$$Secure\nCode Warrior: Large Max Request Length Training{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Uncontrolled Resource\nConsumption{{/focus}}{{{nl}}} The software does not\nproperly control the allocation and maintenance of a limited resource,\nthereby enabling an actor to influence the amount of resources consumed,\neventually leading to the exhaustion of available resources.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Large Max Request Length{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/dos/routing$$LINK_DELIM$$Secure\nCode Warrior: Large Max Request Length Training{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Uncontrolled Resource\nConsumption{{/focus}}{{{nl}}} The software does not\nproperly control the allocation and maintenance of a limited resource,\nthereby enabling an actor to influence the amount of resources consumed,\neventually leading to the exhaustion of available resources.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "unsafe-readline",
"shortDescription" : "Use of readLine on Untrusted Streams",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/434.html",
"likelihood" : "Low",
"references" : "",
"owasp" : "https://wiki.owasp.org/index.php/Application_Denial_of_Service",
"impact" : "Medium",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Use of readLine on Untrusted Streams{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/fileupload/unrestricted$$LINK_DELIM$$Secure\nCode Warrior: Use of readLine on Untrusted Streams\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_27_UNRESTRICTED_FILE_UPLOADS_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Use of readLine on Untrusted Streams\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Unrestricted Upload of File with Dangerous\nType{{/focus}}{{{nl}}} The software allows the attacker\nto upload or transfer files of dangerous types that can be automatically\nprocessed within the product's environment. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Use of readLine on Untrusted Streams{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/fileupload/unrestricted$$LINK_DELIM$$Secure\nCode Warrior: Use of readLine on Untrusted Streams\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_27_UNRESTRICTED_FILE_UPLOADS_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Use of readLine on Untrusted Streams\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Unrestricted Upload of File with Dangerous\nType{{/focus}}{{{nl}}} The software allows the attacker\nto upload or transfer files of dangerous types that can be automatically\nprocessed within the product's environment. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Availability"
}
}, {
"id" : "crypto-weak-randomness",
"shortDescription" : "Weak Random Number Generation",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/330.html",
"likelihood" : "Low",
"references" : "",
"owasp" : "https://owasp.org/Top10/A02_2021-Cryptographic_Failures/",
"custom references" : {
"text" : "https://owasp.org/www-community/vulnerabilities/Insecure_Randomness\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-community/vulnerabilities/Insecure_Randomness{{{nl}}}"
},
"impact" : "Low",
"confidence level" : 2,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Weak Random Number Generation{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/crypto/insecurerandomness$$LINK_DELIM$$Secure\nCode Warrior: Weak Random Number Generation Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_59_Insecure_Randomness_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Weak Random Number Generation Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Use of Insufficiently Random\nValues{{/focus}}{{{nl}}} The software uses\ninsufficiently random numbers or values in a security context that\ndepends on unpredictable numbers. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Weak Random Number Generation{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/crypto/insecurerandomness$$LINK_DELIM$$Secure\nCode Warrior: Weak Random Number Generation Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_59_Insecure_Randomness_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Weak Random Number Generation Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Use of Insufficiently Random\nValues{{/focus}}{{{nl}}} The software uses\ninsufficiently random numbers or values in a security context that\ndepends on unpredictable numbers. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Cryptography"
}
}, {
"id" : "rails-http-only-disabled",
"shortDescription" : "Rails HttpOnly Cookie Flag Disabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/1004.html",
"likelihood" : "Low",
"references" : "https://owasp.org/www-community/HttpOnly",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Rails HttpOnly Cookie Flag Disabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Rails HttpOnly Cookie Flag Disabled\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Rails HttpOnly Cookie Flag Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie Without\n'HttpOnly' Flag{{/focus}}{{{nl}}} The software uses a\ncookie to store sensitive information, but the cookie is not marked with\nthe HttpOnly flag. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Rails HttpOnly Cookie Flag Disabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Rails HttpOnly Cookie Flag Disabled\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Rails HttpOnly Cookie Flag Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie Without\n'HttpOnly' Flag{{/focus}}{{{nl}}} The software uses a\ncookie to store sensitive information, but the cookie is not marked with\nthe HttpOnly flag. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Session Management"
}
}, {
"id" : "xxssprotection-header-disabled",
"shortDescription" : "Response With X-XSS-Protection Disabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/79.html",
"likelihood" : "Low",
"references" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"owasp" : "https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html",
"custom references" : {
"text" : "https://owasp.org/www-community/attacks/xss/\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-community/attacks/xss/{{{nl}}}"
},
"impact" : "Low",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Response With X-XSS-Protection Disabled{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/xss$$LINK_DELIM$$Secure\nCode Warrior: Response With X-XSS-Protection Disabled\nTraining{{/linkExternal}} {{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_71_Cross+Site+Scripting_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Response With X-XSS-Protection Disabled\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}} {{#focus}}Improper\nNeutralization of Input During Web Page Generation ('Cross-site\nScripting'){{/focus}}{{{nl}}} The software does not\nneutralize or incorrectly neutralizes user-controllable input before it\nis placed in output that is used as a web page that is served to other\nusers. {{/grayedData}} {{/blockQuote}} {{!-- end SCW\nintegration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Response With X-XSS-Protection Disabled{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/xss$$LINK_DELIM$$Secure\nCode Warrior: Response With X-XSS-Protection Disabled\nTraining{{/linkExternal}} {{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_71_Cross+Site+Scripting_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Response With X-XSS-Protection Disabled\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}} {{#focus}}Improper\nNeutralization of Input During Web Page Generation ('Cross-site\nScripting'){{/focus}}{{{nl}}} The software does not\nneutralize or incorrectly neutralizes user-controllable input before it\nis placed in output that is used as a web page that is served to other\nusers. {{/grayedData}} {{/blockQuote}} {{!-- end SCW\nintegration block --}}"
},
"category" : "XSS"
}
}, {
"id" : "httponly",
"shortDescription" : "Session Cookie Has No 'HttpOnly' Flag",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/1004.html",
"likelihood" : "High",
"references" : "https://owasp.org/www-community/HttpOnly",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Session Cookie Has No 'HttpOnly' Flag{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'HttpOnly' Flag\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'HttpOnly' Flag\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Sensitive Cookie Without 'HttpOnly' Flag{{/focus}}{{{nl}}}\nThe software uses a cookie to store sensitive information, but the\ncookie is not marked with the HttpOnly flag. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Session Cookie Has No 'HttpOnly' Flag{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'HttpOnly' Flag\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Session Cookie Has No 'HttpOnly' Flag\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Sensitive Cookie Without 'HttpOnly' Flag{{/focus}}{{{nl}}}\nThe software uses a cookie to store sensitive information, but the\ncookie is not marked with the HttpOnly flag. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Session Management"
}
}, {
"id" : "prompt-injection",
"shortDescription" : "Prompt Injection",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/94.html",
"likelihood" : "Medium",
"references" : "",
"owasp" : "https://owasp.org/www-project-top-10-for-large-language-model-applications/",
"impact" : "Medium",
"confidence level" : 3,
"category" : "Input Validation"
}
}, {
"id" : "request-validation-control-disabled",
"shortDescription" : "Request Validation Mode Disabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/20.html",
"likelihood" : "High",
"references" : "https://msdn.microsoft.com/en-us/library/hh882339.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Request Validation Mode Disabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Request Validation Mode Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Request Validation Mode Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Security Misconfiguration -\nDisabled Security Features{{/focus}}{{{nl}}} This\nvulnerability refers to a mistake or lack of environment identification\ncapabilities that could lead to certain security features being disabled\n(e.g.: access-control). Having such features disabled in a production\nenvironment would leave an application running exclusively on\nsecurity-through-obscurity (simply hiding menu options and such like)\nthat should not be considered of security value.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Request Validation Mode Disabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Request Validation Mode Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Request Validation Mode Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Security Misconfiguration -\nDisabled Security Features{{/focus}}{{{nl}}} This\nvulnerability refers to a mistake or lack of environment identification\ncapabilities that could lead to certain security features being disabled\n(e.g.: access-control). Having such features disabled in a production\nenvironment would leave an application running exclusively on\nsecurity-through-obscurity (simply hiding menu options and such like)\nthat should not be considered of security value.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Input Validation"
}
}, {
"id" : "nosql-injection",
"shortDescription" : "NoSQL Injection",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/943.html",
"likelihood" : "High",
"references" : "https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_in_Java_Cheat_Sheet.html#nosql\nhttps://portswigger.net/web-security/nosql-injection",
"owasp" : "https://owasp.org/Top10/A03_2021-Injection/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}NoSQL Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/nosql$$LINK_DELIM$$Secure\nCode Warrior: NoSQL Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_21_NoSQL_INJECTION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: NoSQL Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nSpecial Elements in Data Query Logic{{/focus}}{{{nl}}}\nThe application generates a query intended to access or manipulate data\nin a data store such as a database, but it does not neutralize or\nincorrectly neutralizes special elements that can modify the intended\nlogic of the query. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}NoSQL Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/nosql$$LINK_DELIM$$Secure\nCode Warrior: NoSQL Injection Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Module_21_NoSQL_INJECTION_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: NoSQL Injection Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Improper Neutralization of\nSpecial Elements in Data Query Logic{{/focus}}{{{nl}}}\nThe application generates a query intended to access or manipulate data\nin a data store such as a database, but it does not neutralize or\nincorrectly neutralizes special elements that can modify the intended\nlogic of the query. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "trace-enabled-aspx",
"shortDescription" : "Tracing Enabled for ASPX",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/497.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/bb386420.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Tracing Enabled for ASPX{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/errordetails$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled for ASPX Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_184_error_details.mp4$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled for ASPX Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Information Exposure - Error\nDetails{{/focus}}{{{nl}}} Displaying too much\ninformation on why an error has occurred can lead to sensitive\ninformation exposure or provide information useful for an attacker to\nidentify or exploit another vulnerability. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Tracing Enabled for ASPX{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/errordetails$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled for ASPX Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_184_error_details.mp4$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled for ASPX Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Information Exposure - Error\nDetails{{/focus}}{{{nl}}} Displaying too much\ninformation on why an error has occurred can lead to sensitive\ninformation exposure or provide information useful for an attacker to\nidentify or exploit another vulnerability. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "session-regenerate",
"shortDescription" : "Expired Session IDs Not Regenerated",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/384.html",
"likelihood" : "Medium",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.sessionstatesection.regenerateexpiredsessionid.aspx",
"owasp" : "https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Expired Session IDs Not Regenerated{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/mobile/improper_session_handling/improper_timeout_of_session_id$$LINK_DELIM$$Secure\nCode Warrior: Expired Session IDs Not Regenerated\nTraining{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Session Handling - Improper Timeout Of Session\nID{{/focus}}{{{nl}}} Improper session handling occurs\nwhen the session token is unintentionally shared with the adversary\nduring a subsequent transaction between the mobile app and the backend\nservers. Once you are authenticated and given a session, that session\nallows one access to the mobile application. Mobile app code must\nprotect user sessions just as carefully as its authentication mechanism.\nAll sessions should implement an idle or inactivity timeout. This\ntimeout defines the amount of time a session will remain active in case\nthere is no activity in the session, closing and invalidating the\nsession upon the defined idle period since the last HTTP request\nreceived by the web application for a given session ID. This\nvulnerability occurs when there is no timeout set on the session ID\ngiven to the user, which means the user is logged in forever.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Expired Session IDs Not Regenerated{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/mobile/improper_session_handling/improper_timeout_of_session_id$$LINK_DELIM$$Secure\nCode Warrior: Expired Session IDs Not Regenerated\nTraining{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Session Handling - Improper Timeout Of Session\nID{{/focus}}{{{nl}}} Improper session handling occurs\nwhen the session token is unintentionally shared with the adversary\nduring a subsequent transaction between the mobile app and the backend\nservers. Once you are authenticated and given a session, that session\nallows one access to the mobile application. Mobile app code must\nprotect user sessions just as carefully as its authentication mechanism.\nAll sessions should implement an idle or inactivity timeout. This\ntimeout defines the amount of time a session will remain active in case\nthere is no activity in the session, closing and invalidating the\nsession upon the defined idle period since the last HTTP request\nreceived by the web application for a given session ID. This\nvulnerability occurs when there is no timeout set on the session ID\ngiven to the user, which means the user is logged in forever.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Session Management"
}
}, {
"id" : "trace-enabled",
"shortDescription" : "Tracing Enabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/497.html",
"likelihood" : "High",
"references" : "https://msdn.microsoft.com/en-us/library/bb386420.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Tracing Enabled{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/errordetails$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_184_error_details.mp4$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Information Exposure - Error\nDetails{{/focus}}{{{nl}}} Displaying too much\ninformation on why an error has occurred can lead to sensitive\ninformation exposure or provide information useful for an attacker to\nidentify or exploit another vulnerability. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Tracing Enabled{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/errordetails$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_184_error_details.mp4$$LINK_DELIM$$Secure\nCode Warrior: Tracing Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Information Exposure - Error\nDetails{{/focus}}{{{nl}}} Displaying too much\ninformation on why an error has occurred can lead to sensitive\ninformation exposure or provide information useful for an attacker to\nidentify or exploit another vulnerability. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "csp-header-missing",
"shortDescription" : "Response Without Content-Security-Policy Header",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/602.html",
"likelihood" : "Low",
"references" : "https://owasp.org/www-community/controls/Content_Security_Policy",
"owasp" : "https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html",
"impact" : "Low",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Response Without Content-Security-Policy Header{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Response Without Content-Security-Policy Header\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Response Without Content-Security-Policy Header\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Security Misconfiguration - Disabled Security\nFeatures{{/focus}}{{{nl}}} This vulnerability refers to\na mistake or lack of environment identification capabilities that could\nlead to certain security features being disabled (e.g.: access-control).\nHaving such features disabled in a production environment would leave an\napplication running exclusively on security-through-obscurity (simply\nhiding menu options and such like) that should not be considered of\nsecurity value. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Response Without Content-Security-Policy Header{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: Response Without Content-Security-Policy Header\nTraining{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: Response Without Content-Security-Policy Header\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}}\n{{#focus}}Security Misconfiguration - Disabled Security\nFeatures{{/focus}}{{{nl}}} This vulnerability refers to\na mistake or lack of environment identification capabilities that could\nlead to certain security features being disabled (e.g.: access-control).\nHaving such features disabled in a production environment would leave an\napplication running exclusively on security-through-obscurity (simply\nhiding menu options and such like) that should not be considered of\nsecurity value. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "log-injection",
"shortDescription" : "Log Injection",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/93.html",
"likelihood" : "Low",
"references" : "",
"owasp" : "https://owasp.org/Top10/A09_2021-Security_Logging_and_Monitoring_Failures/",
"custom references" : {
"text" : "https://owasp.org/www-community/attacks/Log_Injection\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-community/attacks/Log_Injection{{{nl}}}"
},
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Log Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/log$$LINK_DELIM$$Secure\nCode Warrior: Log Injection Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_153_log_forging.mp4$$LINK_DELIM$$Secure\nCode Warrior: Log Injection Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Neutralization of CRLF Sequences ('CRLF\nInjection'){{/focus}}{{{nl}}} The software uses CRLF\n(carriage return line feeds) as a special element, e.g. to separate\nlines or records, but it does not neutralize or incorrectly neutralizes\nCRLF sequences from inputs. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Log Injection{{/focus}} vulnerabilities over on the Secure\nCode Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/injection/log$$LINK_DELIM$$Secure\nCode Warrior: Log Injection Training{{/linkExternal}} {{/listElement}}\n{{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_153_log_forging.mp4$$LINK_DELIM$$Secure\nCode Warrior: Log Injection Video{{/linkExternal}} {{/listElement}}\n{{/unorderedList}} {{#blockQuote}} {{#grayedData}}\n{{#focus}}Improper Neutralization of CRLF Sequences ('CRLF\nInjection'){{/focus}}{{{nl}}} The software uses CRLF\n(carriage return line feeds) as a special element, e.g. to separate\nlines or records, but it does not neutralize or incorrectly neutralizes\nCRLF sequences from inputs. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Injection"
}
}, {
"id" : "wcf-detect-replays",
"shortDescription" : "WCF Replay Detection Not Enabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/200.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/aa738652(v=vs.110).aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"custom references" : {
"text" : "https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure\nhttps://owasp.org/www-project-proactive-controls/v3/en/c8-protect-data-everywhere\nhttps://owasp.org/Top10/A02_2021-Cryptographic_Failures/\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure{{{nl}}}https://owasp.org/www-project-proactive-controls/v3/en/c8-protect-data-everywhere{{{nl}}}https://owasp.org/Top10/A02_2021-Cryptographic_Failures/{{{nl}}}"
},
"impact" : "Medium",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}WCF Replay Detection Not Enabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: WCF Replay Detection Not Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_57_sensitive_data_exposure.mp4$$LINK_DELIM$$Secure\nCode Warrior: WCF Replay Detection Not Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Exposure of Sensitive\nInformation to an Unauthorized Actor{{/focus}}{{{nl}}} The product\nexposes sensitive information to an actor that is not explicitly\nauthorized to have access to that information. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}WCF Replay Detection Not Enabled{{/focus}} vulnerabilities\nover on the Secure Code Warrior platform by watching videos and\ncompleting training exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/sensitiveinfo$$LINK_DELIM$$Secure\nCode Warrior: WCF Replay Detection Not Enabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_57_sensitive_data_exposure.mp4$$LINK_DELIM$$Secure\nCode Warrior: WCF Replay Detection Not Enabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Exposure of Sensitive\nInformation to an Unauthorized Actor{{/focus}}{{{nl}}} The product\nexposes sensitive information to an actor that is not explicitly\nauthorized to have access to that information. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Configuration"
}
}, {
"id" : "crypto-bad-ciphers",
"shortDescription" : "Insecure Encryption Algorithms",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/327.html",
"likelihood" : "Low",
"references" : "https://owasp.org/Top10/A02_2021-Cryptographic_Failures/\nhttps://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html",
"owasp" : "https://owasp.org/Top10/A02_2021-Cryptographic_Failures/",
"custom references" : {
"text" : "https://owasp.org/www-community/vulnerabilities/Using_a_broken_or_risky_cryptographic_algorithm\nhttps://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html\nhttps://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html\n",
"formattedTextVariables" : { },
"formattedText" : "https://owasp.org/www-community/vulnerabilities/Using_a_broken_or_risky_cryptographic_algorithm{{{nl}}}https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html{{{nl}}}https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html{{{nl}}}"
},
"impact" : "Low",
"confidence level" : 1,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Insecure Encryption Algorithms{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/crypto/algorithm$$LINK_DELIM$$Secure\nCode Warrior: Insecure Encryption Algorithms Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_78_weak_crypto_algorithm.mp4$$LINK_DELIM$$Secure\nCode Warrior: Insecure Encryption Algorithms Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Use of a Broken or Risky\nCryptographic Algorithm{{/focus}}{{{nl}}} The use of a\nbroken or risky cryptographic algorithm is an unnecessary risk that may\nresult in the exposure of sensitive information. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Insecure Encryption Algorithms{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/crypto/algorithm$$LINK_DELIM$$Secure\nCode Warrior: Insecure Encryption Algorithms Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_78_weak_crypto_algorithm.mp4$$LINK_DELIM$$Secure\nCode Warrior: Insecure Encryption Algorithms Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Use of a Broken or Risky\nCryptographic Algorithm{{/focus}}{{{nl}}} The use of a\nbroken or risky cryptographic algorithm is an unnecessary risk that may\nresult in the exposure of sensitive information. {{/grayedData}}\n{{/blockQuote}} {{!-- end SCW integration block --}}"
},
"category" : "Cryptography"
}
}, {
"id" : "http-only-disabled",
"shortDescription" : "HttpOnly Cookie Flag Disabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/1004.html",
"likelihood" : "Low",
"references" : "https://owasp.org/www-community/HttpOnly",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "Low",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}HttpOnly Cookie Flag Disabled{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: HttpOnly Cookie Flag Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: HttpOnly Cookie Flag Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie Without\n'HttpOnly' Flag{{/focus}}{{{nl}}} The software uses a\ncookie to store sensitive information, but the cookie is not marked with\nthe HttpOnly flag. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}HttpOnly Cookie Flag Disabled{{/focus}} vulnerabilities over\non the Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/misconfig/securityfeatures$$LINK_DELIM$$Secure\nCode Warrior: HttpOnly Cookie Flag Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_132_disabled_security_features.mp4$$LINK_DELIM$$Secure\nCode Warrior: HttpOnly Cookie Flag Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Sensitive Cookie Without\n'HttpOnly' Flag{{/focus}}{{{nl}}} The software uses a\ncookie to store sensitive information, but the cookie is not marked with\nthe HttpOnly flag. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Session Management"
}
}, {
"id" : "authorization-missing-deny",
"shortDescription" : "Authorization Rules Missing Deny Rule",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/294.html",
"likelihood" : "Medium",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.authorizationsection.aspx",
"owasp" : "https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/",
"custom references" : {
"text" : "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html\n",
"formattedTextVariables" : { },
"formattedText" : "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html{{{nl}}}"
},
"impact" : "Medium",
"confidence level" : 2,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Authorization Rules Missing Deny Rule{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/auth/missingauth$$LINK_DELIM$$Secure\nCode Warrior: Authorization Rules Missing Deny Rule\nTraining{{/linkExternal}} {{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_128_improper_authentication.mp4$$LINK_DELIM$$Secure\nCode Warrior: Authorization Rules Missing Deny Rule\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}} {{#focus}}Authentication\nBypass by Capture-replay{{/focus}}{{{nl}}} A capture-replay flaw exists\nwhen the design of the software makes it possible for a malicious user\nto sniff network traffic and bypass authentication by replaying it to\nthe server in question to the same effect as the original message (or\nwith minor changes). {{/grayedData}} {{/blockQuote}} {{!-- end\nSCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Authorization Rules Missing Deny Rule{{/focus}}\nvulnerabilities over on the Secure Code Warrior platform by watching\nvideos and completing training exercises and missions that focus on\nsecure coding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/auth/missingauth$$LINK_DELIM$$Secure\nCode Warrior: Authorization Rules Missing Deny Rule\nTraining{{/linkExternal}} {{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_128_improper_authentication.mp4$$LINK_DELIM$$Secure\nCode Warrior: Authorization Rules Missing Deny Rule\nVideo{{/linkExternal}} {{/listElement}} {{/unorderedList}}\n{{#blockQuote}} {{#grayedData}} {{#focus}}Authentication\nBypass by Capture-replay{{/focus}}{{{nl}}} A capture-replay flaw exists\nwhen the design of the software makes it possible for a malicious user\nto sniff network traffic and bypass authentication by replaying it to\nthe server in question to the same effect as the original message (or\nwith minor changes). {{/grayedData}} {{/blockQuote}} {{!-- end\nSCW integration block --}}"
},
"category" : "Access Control"
}
}, {
"id" : "forms-auth-protection",
"shortDescription" : "Forms Auth Protection Mode",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/601.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.formsauthenticationconfiguration.protection.aspx",
"owasp" : "https://owasp.org/Top10/A01_2021-Broken_Access_Control/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Forms Auth Protection Mode{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/uraf/generic$$LINK_DELIM$$Secure\nCode Warrior: Forms Auth Protection Mode Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Unvalidated_Redirects_and_Forwards_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Forms Auth Protection Mode Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}URL Redirection to Untrusted\nSite ('Open Redirect'){{/focus}}{{{nl}}} A web\napplication accepts a user-controlled input that specifies a link to an\nexternal site, and uses that link in a Redirect. This simplifies\nphishing attacks. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Forms Auth Protection Mode{{/focus}} vulnerabilities over on\nthe Secure Code Warrior platform by watching videos and completing\ntraining exercises and missions that focus on secure\ncoding.{{/paragraph}} {{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/uraf/generic$$LINK_DELIM$$Secure\nCode Warrior: Forms Auth Protection Mode Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/Unvalidated_Redirects_and_Forwards_v2.mp4$$LINK_DELIM$$Secure\nCode Warrior: Forms Auth Protection Mode Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}URL Redirection to Untrusted\nSite ('Open Redirect'){{/focus}}{{{nl}}} A web\napplication accepts a user-controlled input that specifies a link to an\nexternal site, and uses that link in a Redirect. This simplifies\nphishing attacks. {{/grayedData}} {{/blockQuote}}\n{{!-- end SCW integration block --}}"
},
"category" : "Authentication"
}
}, {
"id" : "header-checking-disabled",
"shortDescription" : "Header Checking Disabled",
"helpUri" : "https://www.contrastsecurity.com",
"properties" : {
"cwe" : "https://cwe.mitre.org/data/definitions/756.html",
"likelihood" : "Low",
"references" : "https://msdn.microsoft.com/en-us/library/system.web.configuration.httpruntimesection.enableheaderchecking.aspx",
"owasp" : "https://owasp.org/Top10/A05_2021-Security_Misconfiguration/",
"impact" : "High",
"confidence level" : 3,
"custom recommendation" : {
"text" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Header Checking Disabled{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/errordetails$$LINK_DELIM$$Secure\nCode Warrior: Header Checking Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_184_error_details.mp4$$LINK_DELIM$$Secure\nCode Warrior: Header Checking Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Missing Custom Error\nPage{{/focus}}{{{nl}}} The software does not return\ncustom error pages to the user, possibly exposing sensitive information.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}",
"formattedTextVariables" : { },
"formattedText" : "{{!-- begin SCW integration block --}} {{#header}}Secure Code Warrior\n{{#omitted}} Beta{{/omitted}}{{/header}} {{#paragraph}}Learn more about\n{{#focus}}Header Checking Disabled{{/focus}} vulnerabilities over on the\nSecure Code Warrior platform by watching videos and completing training\nexercises and missions that focus on secure coding.{{/paragraph}}\n{{#unorderedList}} {{#listElement}}\n{{#linkExternal}}https://portal.securecodewarrior.com/?utm_source=partner-integration:contrast#/contextual-microlearning/web/infoexposure/errordetails$$LINK_DELIM$$Secure\nCode Warrior: Header Checking Disabled Training{{/linkExternal}}\n{{/listElement}} {{#listElement}}\n{{#linkExternal}}https://media.securecodewarrior.com/v2/module_184_error_details.mp4$$LINK_DELIM$$Secure\nCode Warrior: Header Checking Disabled Video{{/linkExternal}}\n{{/listElement}} {{/unorderedList}} {{#blockQuote}}\n{{#grayedData}} {{#focus}}Missing Custom Error\nPage{{/focus}}{{{nl}}} The software does not return\ncustom error pages to the user, possibly exposing sensitive information.\n{{/grayedData}} {{/blockQuote}} {{!-- end SCW integration block --}}"
},