Skip to content

Code Security Report: 107 high severity findings, 173 total findings #22

@mend-for-github-com

Description

@mend-for-github-com

Code Security Report

Latest Scan: 2022-12-07 05:58pm
Total Findings: 173
Tested Project Files: 105
Detected Programming Languages: 2

  • Check this box to manually trigger a scan

Language: Java

Severity CWE Vulnerability Type Count
High CWE-89 SQL Injection 37
High CWE-643 XPath Injection 2
High CWE-94 Code Injection 2
High CWE-22 Path/Directory Traversal 11
High CWE-73 File Manipulation 1
High CWE-79 Cross-Site Scripting 54
Medium CWE-798 Hardcoded Password/Credentials 1
Medium CWE-338 Weak Pseudo-Random 1
Medium CWE-244 Heap Inspection 13
Medium CWE-501 Trust Boundary Violation 11
Medium CWE-209 Error Messages Information Exposure 3
Low CWE-601 Unvalidated/Open Redirect 1
Low CWE-916 Weak Hash Strength 1
Low CWE-113 HTTP Header Injection 3
Low CWE-20 Cookie Injection 4
Low CWE-20 Session Poisoning 11
Low CWE-941 Arbitrary Server Connection 14

Details

The below list presents the 20 most relevant findings that need your attention. To view information on the remaining findings, navigate to the Mend SAST Application.

SQL Injection (CWE-89) : 20

Findings

sqli/download_id_union.jsp:24

if(fileid!=null && !fileid.equals(""))
{
Connection con=new DBConnect().connect(getServletContext().getRealPath("/WEB-INF/config.properties"));
Statement stmt = con.createStatement();
ResultSet rs =null;
rs=stmt.executeQuery("select * from FilesList where fileid="+fileid);

Trace

rs=stmt.executeQuery("select * from FilesList where fileid="+fileid);

sqli/download_id.jsp:24

if(fileid!=null && !fileid.equals(""))
{
Connection con=new DBConnect().connect(getServletContext().getRealPath("/WEB-INF/config.properties"));
Statement stmt = con.createStatement();
ResultSet rs =null;
rs=stmt.executeQuery("select * from FilesList where fileid="+fileid);

Trace

String fileid=request.getParameter("fileid");

rs=stmt.executeQuery("select * from FilesList where fileid="+fileid);

controller/Register.java:58

{
if(con!=null && !con.isClosed())
{
Statement stmt = con.createStatement();
stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

Trace

stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

controller/Register.java:58

{
if(con!=null && !con.isClosed())
{
Statement stmt = con.createStatement();
stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

Trace

stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

webapp/myprofile.jsp:29

out.print("UserName : "+rs.getString("username")+"<br>");
out.print("Email : "+rs.getString("email")+"<br>");
out.print("About : "+rs.getString("about")+"<br>");
//Getting Card Details:
ResultSet rs1=stmt.executeQuery("select * from cards where id="+id);

Trace

String id=request.getParameter("id");

ResultSet rs1=stmt.executeQuery("select * from cards where id="+id);

controller/Register.java:58

{
if(con!=null && !con.isClosed())
{
Statement stmt = con.createStatement();
stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

Trace

stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

csrf/changepassword.jsp:40

if(pass!=null && confirmPass!=null && !pass.equals("") )
{
if(pass.equals(confirmPass) )
{
Statement stmt = con.createStatement();
stmt.executeUpdate("Update users set password='"+pass+"' where id="+id);

Trace

stmt.executeUpdate("Update users set password='"+pass+"' where id="+id);

vulnerability/forumposts.jsp:14

String postid=request.getParameter("postid");
if(postid!=null)
{
Statement stmt = con.createStatement();
ResultSet rs =null;
rs=stmt.executeQuery("select * from posts where postid="+postid);

Trace

String postid=request.getParameter("postid");

rs=stmt.executeQuery("select * from posts where postid="+postid);

controller/Register.java:58

{
if(con!=null && !con.isClosed())
{
Statement stmt = con.createStatement();
stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

Trace

stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

admin/manageusers.jsp:14

Connection con=new DBConnect().connect(getServletContext().getRealPath("/WEB-INF/config.properties"));
Statement stmt = con.createStatement();
if(request.getParameter("delete")!=null)
{
String user=request.getParameter("user");
stmt.executeUpdate("Delete from users where username='"+user+"'");

Trace

String user=request.getParameter("user");

stmt.executeUpdate("Delete from users where username='"+user+"'");

controller/Register.java:58

{
if(con!=null && !con.isClosed())
{
Statement stmt = con.createStatement();
stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

Trace

stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");

csrf/change-info.jsp:31

String info=request.getParameter("info");
String id=session.getAttribute("userid").toString();
if(info!=null && !info.equals("") && id!=null)
{
Statement stmt = con.createStatement();
stmt.executeUpdate("Update users set about='"+info+"' where id="+id);

Trace

stmt.executeUpdate("Update users set about='"+info+"' where id="+id);

idor/change-email.jsp:32

String email=request.getParameter("email");
String id=request.getParameter("id");
if(email!=null && !email.equals("") && id!=null)
{
Statement stmt = con.createStatement();
stmt.executeUpdate("Update users set email='"+email+"' where id="+id);

Trace

stmt.executeUpdate("Update users set email='"+email+"' where id="+id);

vulnerability/UserDetails.jsp:13

String username=request.getParameter("username");
if(username!=null && !username.equals(""))
{
Statement stmt = con.createStatement();
ResultSet rs =null;
rs=stmt.executeQuery("select * from users where username='"+username+"'");

Trace

String username=request.getParameter("username");

rs=stmt.executeQuery("select * from users where username='"+username+"'");

admin/adminlogin.jsp:19

{
if(con!=null && !con.isClosed())
{
ResultSet rs=null;
Statement stmt = con.createStatement();
rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"' and privilege='admin'");

Trace

String user=request.getParameter("username");

rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"' and privilege='admin'");

controller/Register.java:59

if(con!=null && !con.isClosed())
{
Statement stmt = con.createStatement();
stmt.executeUpdate("INSERT into users(username, password, email, About,avatar,privilege,secretquestion,secret) values ('"+user+"','"+pass+"','"+email+"','"+about+"','default.jpg','user',1,'"+secret+"')");
stmt.executeUpdate("INSERT into UserMessages(recipient, sender, subject, msg) values ('"+user+"','admin','Hi','Hi<br/> This is admin of this page. <br/> Welcome to Our Forum')");

Trace

stmt.executeUpdate("INSERT into UserMessages(recipient, sender, subject, msg) values ('"+user+"','admin','Hi','Hi<br/> This is admin of this page. <br/> Welcome to Our Forum')");

controller/LoginValidator.java:52

Connection con=new DBConnect().connect(getServletContext().getRealPath("/WEB-INF/config.properties"));
if(con!=null && !con.isClosed())
{
ResultSet rs=null;
Statement stmt = con.createStatement();
rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

Trace

rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

webapp/changeCardDetails.jsp:43

String cvv=request.getParameter("cvv");
String expirydate=request.getParameter("expirydate");
if(!cardno.equals("") && !cvv.equals("") && !expirydate.equals(""))
{
Statement stmt = con.createStatement();
stmt.executeUpdate("INSERT into cards(id,cardno, cvv,expirydate) values ('"+id+"','"+cardno+"','"+cvv+"','"+expirydate+"')");

Trace

String expirydate=request.getParameter("expirydate");

stmt.executeUpdate("INSERT into cards(id,cardno, cvv,expirydate) values ('"+id+"','"+cardno+"','"+cvv+"','"+expirydate+"')");

vulnerability/forum.jsp:48

String title=request.getParameter("title");
if(con!=null && !con.isClosed())
{
Statement stmt = con.createStatement();
//Posting Content
stmt.executeUpdate("INSERT into posts(content,title,user) values ('"+content+"','"+title+"','"+user+"')");

Trace

String content=request.getParameter("content");

stmt.executeUpdate("INSERT into posts(content,title,user) values ('"+content+"','"+title+"','"+user+"')");

controller/LoginValidator.java:52

Connection con=new DBConnect().connect(getServletContext().getRealPath("/WEB-INF/config.properties"));
if(con!=null && !con.isClosed())
{
ResultSet rs=null;
Statement stmt = con.createStatement();
rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

Trace

rs=stmt.executeQuery("select * from users where username='"+user+"' and password='"+pass+"'");

Language: JavaScript / Node.js

Severity CWE Vulnerability Type Count
Medium CWE-798 Hardcoded Password/Credentials 3

Details

No high vulnerability findings detected. To view information on the remaining findings, navigate to the Mend SAST Application.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions