Skip to content

Latest commit

 

History

History
114 lines (64 loc) · 5.63 KB

CodeGuard.md

File metadata and controls

114 lines (64 loc) · 5.63 KB

CodeGuard Scan Report img img

Project: Sanofi-Shared-GitHub-Apps/cyber-private-test-alac

Source: zip -- Branch: main

Scan Execution date: 2022-05-02T09:27:47.434924Z

Scan Id: d1eb674f-256d-4e75-9e1a-f3285ac4a650

Scan Status: Completed

Executive summary

You'll find below a list of vulnerabilities identified by our service on both Static Application Security Testing and Software Composition Analysis dimensions:

  • SCA analyzes open source and 3rd party libraries (vulnerabilities and legal risks)
  • SAST focuses on custom code (built by the development team)
SCA SAST
🔴
HIGH
🔴
HIGH
🟠
MEDIUM
🟢
LOW
0 3 2 2

SCA Alerts

List of Packages

NO Packages with HIGH CVEs

List of Container Packages

NO Packages with HIGH CVEs

SAST Detailed Alerts

(1) HIGH - Command_Injection

CWE: 77

(RECURRENT) Description:The application's $PageLoad method calls an OS (shell) command with exec, at line 14 of /sample.php, using an untrusted string with the command to execute.  

This could allow an attacker to inject an arbitrary command, and enable a Command Injection attack.

The attacker may be able to inject the executed command via user input, _COOKIE, which is retrieved by the application in the $PageLoad method, at line 13 of /sample.php.

https://github.com/Sanofi-Shared-GitHub-Apps/cyber-private-test-alac/blob/ad52ab02d2c3a6322ee62e2d6b28181ecabc0f08/sample.php#L12-L16

origin: /sample.php - exec line 14

(1) HIGH - Reflected_XSS_All_Clients

CWE: 79

(RECURRENT) Description:The application's $PageLoad embeds untrusted data in the generated output with echo, at line 5 of /sample.php. This untrusted data is embedded straight into the output without proper sanitization or encoding, enabling an attacker to inject malicious code into the output.

The attacker would be able to alter the returned web page by simply providing modified data in the user input _GET, which is read by the $PageLoad method at line 4 of /sample.php. This input then flows through the code straight to the output web page, without sanitization. 

This can enable a Reflected Cross-Site Scripting (XSS) attack.

https://github.com/Sanofi-Shared-GitHub-Apps/cyber-private-test-alac/blob/ad52ab02d2c3a6322ee62e2d6b28181ecabc0f08/sample.php#L3-L7

origin: /sample.php - echo line 5

(1) HIGH - SQL_Injection

CWE: 89

(RECURRENT) Description:The application's $PageLoad method executes an SQL query with mysql_query, at line 10 of /sample.php. The application constructs this SQL query by embedding an untrusted string into the query without proper sanitization. The concatenated string is submitted to the database, where it is parsed and executed accordingly.

An attacker would be able to inject arbitrary syntax and data into the SQL query, by crafting a malicious payload and providing it via the input _POST; this input is then read by the $PageLoad method at line 9 of /sample.php. This input then flows through the code, into a query and to the database server - without sanitization.

This may enable an SQL Injection attack.

https://github.com/Sanofi-Shared-GitHub-Apps/cyber-private-test-alac/blob/ad52ab02d2c3a6322ee62e2d6b28181ecabc0f08/sample.php#L8-L12

origin: /sample.php - mysql_query line 10

(1) MEDIUM - Missing_HSTS_Header

CWE: 346

(RECURRENT) Description:The web-application does not define an HSTS header, leaving it vulnerable to attack.

https://github.com/Sanofi-Shared-GitHub-Apps/cyber-private-test-alac/blob/ad52ab02d2c3a6322ee62e2d6b28181ecabc0f08/sample.php#L1-L3

origin: /sample.php - $NS_sample_79a4f4e1 line 1

(1) MEDIUM - Parameter_Tampering

CWE: 472

(RECURRENT) Description:Method $PageLoad at line 9 of /sample.php gets user input from element _POST. This input is later concatenated by the application directly into a string variable containing SQL commands, without being validated. This string is then used in method $PageLoad to query the database mysql_query, at line 10 of /sample.php, without any additional filtering by the database. This could allow the user to tamper with the filter parameter.https://github.com/Sanofi-Shared-GitHub-Apps/cyber-private-test-alac/blob/ad52ab02d2c3a6322ee62e2d6b28181ecabc0f08/sample.php#L8-L12

origin: /sample.php - mysql_query line 10