-
Notifications
You must be signed in to change notification settings - Fork 1
AutoFix PR #30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: nishfath-patch-12
Are you sure you want to change the base?
AutoFix PR #30
Conversation
…E.java for finding 186
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.
7 similar comments
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.
Checking analysis of application
|
| ID | CVSS | Rating | CVE | Title |
|---|---|---|---|---|
| 255 | 10.0 | critical | CVE-2018-14721 | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b… |
| 547 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 554 | 10.0 | critical | CVE-2021-44228 | Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. |
| 245 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| 247 | 9.8 | critical | CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli… |
| Severity rating | Count |
|---|---|
| Critical | 95 |
| High | 242 |
| Medium | 165 |
| Low | 115 |
| Finding Type | Count |
|---|---|
| Oss_vuln | 370 |
| Vuln | 217 |
| Security_issue | 30 |
| Secret | 2 |
| OWASP 2021 Category | Count |
|---|---|
| A03-Injection | 66 |
| A09-Security-Logging-And-Monitoring-Failures | 53 |
| A01-Broken-Access-Control | 50 |
| A05-Security-Misconfiguration | 46 |
| A10-Server-Side-Request-Forgery-(Ssrf) | 25 |
| A08-Software-And-Data-Integrity-Failures | 5 |
| A07-Identification-And-Authentication-Failures | 1 |
| A02-Cryptographic-Failures | 1 |
1 rule failed.


Qwiet AI AutoFix
This PR was created automatically by the Qwiet AI AutoFix tool.
As long as it is open, subsequent scans and generated fixes to this same branch will be added to it as new commits.
Each commit fixes one vulnerability.
Some manual intervention might be required before merging this PR.
Project Information
Findings/Vulnerabilities Fixed
Finding 61: Directory Traversal: Attacker-controlled Data Used in File Path via
multifileinFileUpload.uploadPictureVulnerability Description
Attacker-Controlled input data is used as part of a file path to write a file without escaping or validation. This indicates a directory traversal vulnerability.
Commits/Files Changed
Finding 67: Directory Traversal: Attacker-controlled Data Used in File Path via
urlinSSRF.openStreamVulnerability Description
Attacker-Controlled input data is used as part of a file path to write a file without escaping or validation. This indicates a directory traversal vulnerability.
Commits/Files Changed
Finding 226: Remote Code Execution: Application Starts a Java Remote Method Invocation (RMI) Server in
Server.mainVulnerability Description
The application listens for connections via the Java Remote Method Invocation (RMI) protocol. By default this allows clients to execute arbitrary code on the server. Ensure you follow best practices of RMI deployment and consider migrating to another RPC protocol.
Commits/Files Changed
Finding 60: Directory Traversal: Attacker-controlled Data Used in File Path via
multifileinFileUpload.uploadPictureVulnerability Description
Attacker-Controlled input data is used as part of a file path to write a file without escaping or validation. This indicates a directory traversal vulnerability.
Commits/Files Changed
Finding 59: Directory Traversal: Attacker-controlled Data Used in File Path via
multifileinFileUpload.uploadPictureVulnerability Description
Attacker-Controlled input data is used as part of a file path to write a file without escaping or validation. This indicates a directory traversal vulnerability.
Commits/Files Changed
Finding 66: Directory Traversal: Attacker-controlled Data Used in File Path via
urlinSSRF.openStreamVulnerability Description
Attacker-Controlled input data is used as part of a file path to write a file without escaping or validation. This indicates a directory traversal vulnerability.
Commits/Files Changed
Finding 185: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 177: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 178: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 179: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 182: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 181: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 186: XML External Entities: Attacker-controlled Data Parsed as XML via
fileinxlsxStreamerXXE.xllx_streamer_xxeVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 184: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed
Finding 180: XML External Entities: Attacker-controlled Data Parsed as XML in
WebUtils.getRequestBodyVulnerability Description
Attacker-controlled data is parsed as XML. This indicates an XML External Entities (XXE) or other XML-based vulnerability like billion laughs.
Commits/Files Changed