Tag: owasp-top10
Rule to detect reflected XSS.
Deserialization of untrusted objects can lead to security vulnerabilities such as, inadvertently running remote code.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Manually creating text-based IAM policies is error-prone.
Encryption that is dependent on conditional logic, such as an if...then
clause, might cause unencrypted sensitive data to be stored.
Potentially unsanitized user input in XPath queries can allow an attacker to control the query in unwanted or insecure ways.
Insecure ways of creating temporary files and directories can lead to race conditions, privilege escalation, and other security vulnerabilities.
Passing data from an untrusted source into a cookie or web response might expose the user to HTTP response splitting attacks.
Insufficient sanitization of potentially untrusted URLs on the server side can allow server requests to unwanted destinations.
Rule to detect lack of authorization check when using address ID.
Find usages of not recommended classes for AWS Credentials and suggest replacing them with something else.
Creating file paths from untrusted input might give a malicious actor access to sensitive files.
Hardcoded credentials can be intercepted by malicious actors.
JWTs should not be parsed using the parse
method.
Security decisions should not depend on branching that can be influenced by untrusted or client-provided data.
Rule to enable detection for potential CORS vulnerabilities in services using the Coral or Spring frameworks.
Insecure cookies can lead to unencrypted transmission of sensitive data.
Objects that parse or handle XML can lead to XML External Entity (XXE) attacks when misconfigured.
LDAP queries that rely on potentially untrusted inputs can allow attackers to read or modify sensitive data, run code, and perform other unwanted actions.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.
Public method parameters should be validated for nullness, unexpected values, and malicious values.
Using untrusted inputs in a log statement can enable attackers to break the log's format, forge log entries, and bypass log monitors.
Sensitive information should not be exposed through log files or stack traces.
Objects that parse or handle XML in XML document can lead to XML External Entity (XXE) attacks when misconfigured.
TLS versions older than TLS version 1.1 support weak, broken, or misconfigured cryptography.
Scripts generated from unsanitized inputs can lead to malicious behavior and inadvertently running code remotely.
Insufficiently restrictive file uploads can lead to inadvertently running malicious code.
Comment parsing for OpenSAML2 might enable an attacker to bypass authentication.
Insecure configuration can lead to a cross-site request forgery (CRSF) vulnerability.
User-controlled input that specifies a link to an external site could lead to phishing attacks and allow user credentials to be stolen.
Use of unsanitized external input in reflection can allow attackers to bypass security checks and run malicious code.
Relying on potentially untrusted user inputs when constructing web application outputs can lead to cross-site scripting vulnerabilities.
Unauthenticated LDAP requests can allow untrusted access to LDAP servers.
Weak obfuscation while configuring a web request
Credentials that are stored in clear text can be intercepted by a malicious actor.
Session fixation might allow an attacker to steal authenticated session IDs.
Weak file permissions can lead to privilege escalation.
Constructing operating system or shell commands with unsanitized user input can lead to inadvertently running malicious code.
Use of untrusted inputs in SQL database query can enable attackers to read, modify, or delete sensitive data in the database
Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.
Deserialization of untrusted data without sufficiently verifying that the resulting data will be valid.
Insufficiently random generators (or hardcoded seeds) can make pseudorandom sequences predictable.
Cross-Origin Resource Sharing policies that are too permissive may lead to security vulnerabilities.
Client-side decryption followed by reencryption is inefficient and can lead to sensitive data leaks.