Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unstable #359

Merged
merged 58 commits into from
Sep 5, 2024
Merged

Unstable #359

merged 58 commits into from
Sep 5, 2024

Conversation

gasRU76
Copy link
Contributor

@gasRU76 gasRU76 commented Aug 14, 2024

No description provided.

@bararchy
Copy link
Member

bararchy commented Aug 14, 2024

Logo
Checkmarx One – Scan Summary & Detailsb60be2d2-9e88-4e10-b392-514cdfc06c40

New Issues

Severity Issue Source File / Package Checkmarx Insight
CRITICAL SQL_Injection /src/products/products.controller.ts: 131 Attack Vector
HIGH CVE-2024-34391 Npm-libxmljs-1.0.11 Vulnerable Package
HIGH CVE-2024-34392 Npm-libxmljs-1.0.11 Vulnerable Package
HIGH Missing User Instruction /Dockerfile: 44 A user should be specified in the dockerfile, otherwise the image will run as root
MEDIUM Client_HTML5_Store_Sensitive_data_In_Web_Storage /client/src/api/makeApiRequest.ts: 13 Attack Vector
MEDIUM Container Capabilities Unrestricted /docker-compose.local.yml: 44 Some capabilities are not needed in certain (or any) containers. Make sure that you only add capabilities that your container needs. Drop unnecessa...
MEDIUM Container Capabilities Unrestricted /docker-compose.local.yml: 27 Some capabilities are not needed in certain (or any) containers. Make sure that you only add capabilities that your container needs. Drop unnecessa...
MEDIUM Container Capabilities Unrestricted /docker-compose.local.yml: 2 Some capabilities are not needed in certain (or any) containers. Make sure that you only add capabilities that your container needs. Drop unnecessa...
MEDIUM Container Traffic Not Bound To Host Interface /docker-compose.local.yml: 35 Incoming container traffic should be bound to a specific host interface
MEDIUM Container Traffic Not Bound To Host Interface /docker-compose.local.yml: 48 Incoming container traffic should be bound to a specific host interface
MEDIUM Container Traffic Not Bound To Host Interface /docker-compose.local.yml: 22 Incoming container traffic should be bound to a specific host interface
MEDIUM Healthcheck Not Set /docker-compose.local.yml: 27 Check containers periodically to see if they are running properly.
MEDIUM Healthcheck Not Set /docker-compose.local.yml: 44 Check containers periodically to see if they are running properly.
MEDIUM Security Opt Not Set /docker-compose.local.yml: 2 Attribute 'security_opt' should be defined.
MEDIUM Security Opt Not Set /docker-compose.local.yml: 27 Attribute 'security_opt' should be defined.
MEDIUM Security Opt Not Set /docker-compose.local.yml: 44 Attribute 'security_opt' should be defined.
LOW Chown Flag Exists /Dockerfile: 27 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 53 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 48 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 30 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 50 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 49 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 56 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 52 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 10 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 25 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 57 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 14 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 13 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 15 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 26 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 32 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 12 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 28 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 29 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 54 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 31 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 11 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 16 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Chown Flag Exists /Dockerfile: 17 It is considered a best practice for every executable in a container to be owned by the root user even if it is executed by a non-root user, only e...
LOW Client_Hardcoded_Domain /client/index.html: 25 Attack Vector
LOW Client_JQuery_Deprecated_Symbols /client/src/main.js: 131 Attack Vector
LOW Client_Password_In_Comment /client/cypress/support/commands.ts: 31 Attack Vector
LOW Healthcheck Instruction Missing /Dockerfile: 44 Ensure that HEALTHCHECK is being used. The HEALTHCHECK instruction tells Docker how to test a container to check that it is still working
LOW Unprotected_Cookie /src/components/headers.configurator.interceptor.ts: 45 Attack Vector
LOW Unprotected_Cookie /src/components/headers.configurator.interceptor.ts: 36 Attack Vector
LOW Use_Of_Hardcoded_Password /src/email/email.service.ts: 15 Attack Vector

Fixed Issues

Severity Issue Source File / Package
HIGH CVE-2004-0989 Npm-libxmljs-0.19.7
HIGH CVE-2015-5312 Npm-libxmljs-0.19.7
HIGH CVE-2016-20018 Npm-knex-0.21.19
HIGH CVE-2017-8872 Npm-libxmljs-0.19.7
HIGH CVE-2017-9048 Npm-libxmljs-0.19.7
HIGH CVE-2018-14404 Npm-libxmljs-0.19.7
HIGH CVE-2020-28469 Npm-glob-parent-3.1.0
HIGH CVE-2021-23337 Npm-lodash.template-4.5.0
HIGH CVE-2021-23424 Npm-ansi-html-0.0.7
HIGH CVE-2021-23436 Npm-immer-8.0.1
HIGH CVE-2021-3516 Npm-libxmljs-0.19.7
HIGH CVE-2021-3517 Npm-libxmljs-0.19.7
HIGH CVE-2021-3518 Npm-libxmljs-0.19.7
HIGH CVE-2021-3757 Npm-immer-8.0.1
HIGH CVE-2021-3803 Npm-nth-check-1.0.2
HIGH CVE-2021-3807 Npm-ansi-regex-3.0.0
HIGH CVE-2021-3807 Npm-ansi-regex-2.1.1
HIGH CVE-2021-3807 Npm-ansi-regex-4.1.0
HIGH CVE-2021-42740 Npm-shell-quote-1.7.2
HIGH CVE-2021-44906 Npm-minimist-1.2.5
HIGH CVE-2022-0144 Npm-shelljs-0.8.4
HIGH CVE-2022-21144 Npm-libxmljs-0.19.7
HIGH CVE-2022-23539 Npm-jsonwebtoken-8.5.1
HIGH CVE-2022-23540 Npm-jsonwebtoken-8.5.1
HIGH CVE-2022-24771 Npm-node-forge-0.10.0
HIGH CVE-2022-24772 Npm-node-forge-0.10.0
HIGH CVE-2022-24999 Npm-qs-6.7.0
HIGH CVE-2022-24999 Npm-qs-6.5.2
HIGH CVE-2022-25858 Npm-terser-4.8.0
HIGH CVE-2022-25858 Npm-terser-5.10.0
HIGH CVE-2022-25883 Npm-semver-7.0.0
HIGH CVE-2022-25883 Npm-semver-6.3.0
HIGH CVE-2022-25883 Npm-semver-7.3.2
HIGH CVE-2022-25883 Npm-semver-7.3.5
HIGH CVE-2022-25883 Npm-semver-7.3.8
HIGH CVE-2022-25883 Npm-semver-5.7.1
HIGH CVE-2022-29078 Npm-ejs-2.7.4
HIGH CVE-2022-31129 Npm-moment-2.29.2
HIGH CVE-2022-3517 Npm-minimatch-3.0.4
HIGH CVE-2022-37599 Npm-loader-utils-2.0.2
HIGH CVE-2022-37599 Npm-loader-utils-1.2.3
HIGH CVE-2022-37599 Npm-loader-utils-2.0.0
HIGH CVE-2022-37599 Npm-loader-utils-1.4.0
HIGH CVE-2022-37601 Npm-loader-utils-1.4.0
HIGH CVE-2022-37601 Npm-loader-utils-1.2.3
HIGH CVE-2022-37601 Npm-loader-utils-2.0.2
HIGH CVE-2022-37601 Npm-loader-utils-2.0.0
HIGH CVE-2022-37603 Npm-loader-utils-1.4.0
HIGH CVE-2022-37603 Npm-loader-utils-2.0.0
HIGH CVE-2022-37603 Npm-loader-utils-2.0.2
HIGH CVE-2022-37603 Npm-loader-utils-1.2.3
HIGH CVE-2022-46175 Npm-json5-2.2.0
HIGH CVE-2022-46175 Npm-json5-1.0.1
HIGH CVE-2023-26115 Npm-word-wrap-1.2.3
HIGH CVE-2023-26136 Npm-tough-cookie-2.5.0
HIGH CVE-2023-28154 Npm-webpack-5.28.0
HIGH CVE-2023-42282 Npm-ip-1.1.5
HIGH CVE-2023-42282 Npm-ip-2.0.0
HIGH CVE-2023-45133 Npm-@babel/traverse-7.16.3
HIGH CVE-2023-45133 Npm-@babel/traverse-7.21.2
HIGH CVE-2023-46234 Npm-browserify-sign-4.2.1
HIGH CVE-2024-27088 Npm-es5-ext-0.10.53
HIGH CVE-2024-29180 Npm-webpack-dev-middleware-3.7.3
HIGH CVE-2024-33883 Npm-ejs-2.7.4
HIGH CVE-2024-35220 Npm-@fastify/session-10.1.1
HIGH CVE-2024-37890 Npm-ws-8.12.1
HIGH CVE-2024-37890 Npm-ws-7.5.9
HIGH CVE-2024-37890 Npm-ws-6.2.2
HIGH CVE-2024-37890 Npm-ws-8.12.0
HIGH CVE-2024-4068 Npm-braces-2.3.2
HIGH CVE-2024-4068 Npm-braces-3.0.2
HIGH Client_DOM_Stored_XSS /client/public/assets/vendor/owl.carousel/owl.carousel.min.js: 717
HIGH Client_DOM_Stored_XSS /client/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 717
HIGH Client_DOM_Stored_XSS /client/public/assets/vendor/owl.carousel/owl.carousel.min.js: 717
HIGH Client_DOM_Stored_XSS /client/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 717
HIGH Client_DOM_XSS /client/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 621
HIGH Client_DOM_XSS /client/public/assets/vendor/owl.carousel/owl.carousel.js: 621
HIGH Client_DOM_XSS /client/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 621
HIGH Client_DOM_XSS /client/public/assets/vendor/owl.carousel/owl.carousel.js: 621
HIGH Cx10578cb2-c0fc Npm-cypress-6.9.1
HIGH Cx15879720-9801 Npm-knex-0.21.19
HIGH Cx347a3da7-ba99 Npm-node-forge-0.10.0
HIGH Cx35ef42d7-054c Npm-ejs-2.7.4
HIGH Cx62f5bb1b-fa5e Npm-moment-2.29.2
HIGH Cxc7705965-e0f0 Npm-@babel/core-7.12.3
HIGH Missing User Instruction /Dockerfile: 46
HIGH Passwords And Secrets - Generic Secret /config-keycloak.yaml: 737
HIGH Passwords And Secrets - Generic Secret /config-keycloak.yaml: 632
HIGH Passwords And Secrets - Google API Key /deployment.yaml: 144
HIGH Privilege Escalation Allowed /deployment.yaml: 30
HIGH Privilege Escalation Allowed /deployment.yaml: 30
HIGH Privilege Escalation Allowed /deployment.yaml: 30
HIGH Privilege Escalation Allowed /deployment.yaml: 30
HIGH Privilege Escalation Allowed /deployment.yaml: 30
HIGH SQL_Injection /src/products/products.controller.ts: 132
HIGH SQL_Injection /src/products/products.controller.ts: 132
HIGH Unpinned Actions Full Length Commit SHA /release.yml: 37
MEDIUM CPU Limits Not Set /deployment.yaml: 30
MEDIUM CPU Limits Not Set /deployment.yaml: 30
MEDIUM CPU Limits Not Set /deployment.yaml: 175
MEDIUM CPU Limits Not Set /deployment.yaml: 30
MEDIUM CPU Limits Not Set /deployment.yaml: 30
MEDIUM CPU Requests Not Set /deployment.yaml: 30
MEDIUM CVE-2018-14567 Npm-libxmljs-0.19.7
MEDIUM CVE-2018-9251 Npm-libxmljs-0.19.7
MEDIUM CVE-2020-24977 Npm-libxmljs-0.19.7
MEDIUM CVE-2021-23364 Npm-browserslist-4.14.2
MEDIUM CVE-2021-3537 Npm-libxmljs-0.19.7
MEDIUM CVE-2021-3541 Npm-libxmljs-0.19.7
MEDIUM CVE-2022-0122 Npm-node-forge-0.10.0
MEDIUM CVE-2022-23541 Npm-jsonwebtoken-8.5.1
MEDIUM CVE-2022-24773 Npm-node-forge-0.10.0
MEDIUM CVE-2022-29622 Npm-formidable-2.1.2
MEDIUM CVE-2022-36313 Npm-file-type-16.5.3
MEDIUM CVE-2023-26144 Npm-graphql-16.6.0
MEDIUM CVE-2023-26159 Npm-follow-redirects-1.14.8
MEDIUM CVE-2023-26159 Npm-follow-redirects-1.15.2
MEDIUM CVE-2023-28155 Npm-@cypress/request-2.88.10
MEDIUM CVE-2023-28155 Npm-request-2.88.2
MEDIUM CVE-2023-44270 Npm-postcss-7.0.36
MEDIUM CVE-2023-44270 Npm-postcss-7.0.39
MEDIUM CVE-2023-44270 Npm-postcss-8.4.4
MEDIUM CVE-2023-45857 Npm-axios-0.21.4
MEDIUM CVE-2023-45857 Npm-axios-0.26.1
MEDIUM CVE-2024-28176 Npm-jose-4.13.1
MEDIUM CVE-2024-28849 Npm-follow-redirects-1.14.8
MEDIUM CVE-2024-28849 Npm-follow-redirects-1.15.2
MEDIUM CVE-2024-28863 Npm-tar-6.1.11
MEDIUM CVE-2024-28863 Npm-tar-4.4.19
MEDIUM CVE-2024-28863 Npm-tar-6.1.13
MEDIUM CVE-2024-29041 Npm-express-4.17.1
MEDIUM CVE-2024-29415 Npm-ip-2.0.0
MEDIUM CVE-2024-29415 Npm-ip-1.1.5
MEDIUM CVE-2024-39249 Npm-async-2.6.4
MEDIUM CVE-2024-39249 Npm-async-3.2.3
MEDIUM CVE-2024-4067 Npm-micromatch-3.1.10
MEDIUM CVE-2024-4067 Npm-micromatch-4.0.5
MEDIUM CVE-2024-4067 Npm-micromatch-4.0.4
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 18
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 15
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 16
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 17
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 18
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 15
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 16
MEDIUM Client_HTML5_Insecure_Storage /client/src/pages/main/Contact.tsx: 17
MEDIUM Client_HTML5_Store_Sensitive_data_In_Web_Storage /client/src/api/makeApiRequest.ts: 13
MEDIUM Client_HTML5_Store_Sensitive_data_In_Web_Storage /client/src/api/makeApiRequest.ts: 13
MEDIUM Container Running As Root /deployment.yaml: 30
MEDIUM Container Running As Root /deployment.yaml: 30
MEDIUM Container Running As Root /deployment.yaml: 30
MEDIUM Container Running As Root /deployment.yaml: 30
MEDIUM Container Running As Root /deployment.yaml: 30
MEDIUM Container Running With Low UID /deployment.yaml: 30
MEDIUM Container Running With Low UID /deployment.yaml: 30
MEDIUM Container Running With Low UID /deployment.yaml: 30
MEDIUM Container Running With Low UID /deployment.yaml: 30
MEDIUM Container Running With Low UID /deployment.yaml: 30
MEDIUM Container Traffic Not Bound To Host Interface /docker-compose.local.yml: 24
MEDIUM Container Traffic Not Bound To Host Interface /docker-compose.local.yml: 37
MEDIUM Container Traffic Not Bound To Host Interface /docker-compose.local.yml: 50
MEDIUM Cx14b19a02-387a Npm-body-parser-1.19.0
MEDIUM Cx41fbf2f3-5595 Npm-shelljs-0.8.4
MEDIUM Cx7c42edbf-d5f1 Npm-base64url-2.0.0
MEDIUM Healthcheck Not Set /docker-compose.local.yml: 29
MEDIUM Healthcheck Not Set /docker-compose.local.yml: 46
MEDIUM Memory Limits Not Defined /deployment.yaml: 30
MEDIUM Memory Limits Not Defined /deployment.yaml: 30
MEDIUM Memory Limits Not Defined /deployment.yaml: 30
MEDIUM Memory Limits Not Defined /deployment.yaml: 30
MEDIUM Memory Not Limited /docker-compose.local.yml: 29
MEDIUM Memory Not Limited /docker-compose.local.yml: 46
MEDIUM Memory Not Limited /docker-compose.local.yml: 4
MEDIUM Memory Requests Not Defined /deployment.yaml: 30
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 30
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 30
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 30
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 30
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 30
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 30
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 30
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 30
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 30
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 30
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 30
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 30
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 30
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 30
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 30
MEDIUM Security Opt Not Set /docker-compose.local.yml: 4
MEDIUM Security Opt Not Set /docker-compose.local.yml: 29
MEDIUM Security Opt Not Set /docker-compose.local.yml: 46
MEDIUM Service Account Token Automount Not Disabled /deployment.yaml: 19
MEDIUM Unpinned Actions Full Length Commit SHA /release.yml: 37
MEDIUM Unpinned Package Version in Apk Add /Dockerfile: 9
MEDIUM Using Unrecommended Namespace /service.yaml: 4
MEDIUM Using Unrecommended Namespace /service.yaml: 28
MEDIUM Using Unrecommended Namespace /service.yaml: 16
LOW CVE-2023-45143 Npm-undici-5.21.0
LOW CVE-2024-24758 Npm-undici-5.21.0
LOW CVE-2024-30260 Npm-undici-5.21.0
LOW CVE-2024-30261 Npm-undici-5.21.0
LOW Chown Flag Exists /Dockerfile: 52
LOW Chown Flag Exists /Dockerfile: 56
LOW Chown Flag Exists /Dockerfile: 18
LOW Chown Flag Exists /Dockerfile: 15
LOW Chown Flag Exists /Dockerfile: 17
LOW Chown Flag Exists /Dockerfile: 27
LOW Chown Flag Exists /Dockerfile: 51
LOW Chown Flag Exists /Dockerfile: 53
LOW Chown Flag Exists /Dockerfile: 20
LOW Chown Flag Exists /Dockerfile: 14
LOW Chown Flag Exists /Dockerfile: 60
LOW Chown Flag Exists /Dockerfile: 32
LOW Chown Flag Exists /Dockerfile: 57
LOW Chown Flag Exists /Dockerfile: 31
LOW Chown Flag Exists /Dockerfile: 29
LOW Chown Flag Exists /Dockerfile: 61
LOW Chown Flag Exists /Dockerfile: 19
LOW Chown Flag Exists /Dockerfile: 28
LOW Chown Flag Exists /Dockerfile: 54
LOW Chown Flag Exists /Dockerfile: 13
LOW Chown Flag Exists /Dockerfile: 30
LOW Chown Flag Exists

More results are available on AST platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants