Skip to content

Conversation

@ibmcloud-devops
Copy link
Owner

Qwiet LogoQwiet Logo

This pull request enables build rules. You can read more about build rules here. The build rules are controlled by the shiftleft.yml file in the repository.

Visit app.shiftleft.io to see the security findings for this repository.

We've done a few things on your behalf

  • Forked this demo application
  • Generated a unique secret SHIFTLEFT_ACCESS_TOKEN to allow GitHub Actions in this repository to communicate with the Qwiet (Shiftleft) API
  • Committed a GitHub Action that will invoke Qwiet preZero's Static Application Security Testing (SAST) on all future pull requests on this repository
  • Created this pull request that demonstrates build rules. It also adds a status check that displays the result of the GitHub Action

Questions? Comments? Want to learn more? Get in touch with us or check out our documentation.

@github-actions
Copy link

Qwiet LogoQwiet Logo

Checking analysis of application shiftleft-java-demo against 3 build rules.

Using sl version 0.9.3457 (f35d88071464fa31f304722c7e5343fa4651da50).

Checking findings on scan 1.

Results per rule:

  • Allow no critical findings: FAIL
    (47 matched vulnerabilities; configured threshold is 0).

    First 5 findings:

        ID   CVSS    Rating    CVE              Title                                                                                                                                                     
     141   10.0   critical   CVE-2018-14721   FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b…
      92    9.8   critical   CVE-2017-5929    QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli…
      97    9.8   critical   CVE-2017-5929    QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli…
     110    9.8   critical   CVE-2017-17485   FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2…
     114    9.8   critical   CVE-2017-7525    A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to p…
     Severity rating   Count 
     Critical             47 
     High                  0 
     Medium                0 
     Low                   0 
     Finding Type   Count 
     Oss_vuln          45 
     Vuln               2 
     Category                Count 
     Remote Code Execution       1 
     Directory Traversal         1 
     OWASP 2021 Category         Count 
     A03-Injection                   1 
     A01-Broken-Access-Control       1 
  • Allow one OSS or container finding: FAIL
    (211 matched vulnerabilities; configured threshold is 1).

    First 5 findings:

        ID   CVSS    Rating    CVE              Title                                                                                                                                                     
     141   10.0   critical   CVE-2018-14721   FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b…
      92    9.8   critical   CVE-2017-5929    QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli…
      97    9.8   critical   CVE-2017-5929    QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli…
     110    9.8   critical   CVE-2017-17485   FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2…
     114    9.8   critical   CVE-2017-7525    A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to p…
     Severity rating   Count 
     Critical             45 
     High                 91 
     Medium               69 
     Low                   6 
  • Allow no reachable OSS vulnerability: FAIL
    (90 matched vulnerabilities; configured threshold is 0).

    First 5 findings:

        ID   CVSS    Rating    CVE              Title                                                                                                                                                     
     259    9.8   critical   CVE-2024-50379   Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems w…
     260    9.8   critical   CVE-2025-24813   Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded fi…
     268    9.8   critical   CVE-2017-5651    In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. I…
     273    9.8   critical   CVE-2018-8014    The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecur…
     283    9.8   critical   CVE-2020-1938    When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as havi…
     Severity rating   Count 
     Critical             10 
     High                 38 
     Medium               39 
     Low                   3 

3 rules failed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants