Skip to content

MAIN-T-124 It's possible to crate document with empty name and description #40

MAIN-T-124 It's possible to crate document with empty name and description

MAIN-T-124 It's possible to crate document with empty name and description #40

Triggered via pull request April 26, 2024 17:23
Status Success
Total duration 3m 30s
Artifacts

gradle-pr.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

1 error, 14 warnings, and 2 notices
Incorrect autowiring in Spring bean components: server/src/main/kotlin/org/hkurh/doky/filestorage/impl/DefaultFileStorageService.kt#L18
|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Could not autowire. There is more than one bean of 'FileStorage' type. | | |--------|-----------------------------------------------------------------------------------------------------------| | Beans: | dokyAzureBlobStorage (DokyAzureBlobStorage.kt) dokyLocalFilesystemStorage (DokyLocalFilesystemStorage.kt) | |
Unused symbol: server/src/main/kotlin/org/hkurh/doky/DokyController.kt#L26
Property "schemaVersion" is never used
Unused symbol: server/src/main/kotlin/org/hkurh/doky/DokyController.kt#L27
Property "label" is never used
Unused symbol: server/src/main/kotlin/org/hkurh/doky/DokyController.kt#L28
Property "color" is never used
Vulnerable API usage: server/src/main/kotlin/org/hkurh/doky/authorization/AuthorizationUserController.kt#L32
Vulnerable API usage * [CVE-2024-22243](https://devhub.checkmarx.com/cve-details/CVE-2024-22243?utm_source=jetbrains&utm_medium=referral) 8.1 Vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: server/src/main/kotlin/org/hkurh/doky/documents/api/DocumentController.kt#L54
Vulnerable API usage * [CVE-2024-22243](https://devhub.checkmarx.com/cve-details/CVE-2024-22243?utm_source=jetbrains&utm_medium=referral) 8.1 Vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: server/src/main/kotlin/org/hkurh/doky/authorization/AuthorizationUserController.kt#L32
Vulnerable API usage * [CVE-2024-22243](https://devhub.checkmarx.com/cve-details/CVE-2024-22243?utm_source=jetbrains&utm_medium=referral) 8.1 Vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: server/src/main/kotlin/org/hkurh/doky/documents/api/DocumentController.kt#L54
Vulnerable API usage * [CVE-2024-22243](https://devhub.checkmarx.com/cve-details/CVE-2024-22243?utm_source=jetbrains&utm_medium=referral) 8.1 Vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: server/build.gradle#L63
Provides transitive vulnerable dependency maven:org.eclipse.jetty:jetty-http:11.0.15 * [CVE-2023-40167](https://devhub.checkmarx.com/cve-details/CVE-2023-40167?utm_source=jetbrains&utm_medium=referral) 5.3 Improper Handling of Length Parameter Inconsistency vulnerability with Medium severity found * [CVE-2023-36478](https://devhub.checkmarx.com/cve-details/CVE-2023-36478?utm_source=jetbrains&utm_medium=referral) 7.5 Integer Overflow or Wraparound vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: server/build.gradle#L63
Provides transitive vulnerable dependency maven:org.eclipse.jetty.http2:http2-hpack:11.0.15 * [CVE-2023-36478](https://devhub.checkmarx.com/cve-details/CVE-2023-36478?utm_source=jetbrains&utm_medium=referral) 7.5 Integer Overflow or Wraparound vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: server/build.gradle#L62
Provides transitive vulnerable dependency maven:io.projectreactor.netty:reactor-netty-http:1.1.9 * [CVE-2023-34062](https://devhub.checkmarx.com/cve-details/CVE-2023-34062?utm_source=jetbrains&utm_medium=referral) 7.5 Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") vulnerability with High severity found * [CVE-2023-34054](https://devhub.checkmarx.com/cve-details/CVE-2023-34054?utm_source=jetbrains&utm_medium=referral) 7.5 Uncontrolled Resource Consumption vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: server/build.gradle#L63
Provides transitive vulnerable dependency maven:org.eclipse.jetty.http2:http2-common:11.0.15 * [CVE-2024-22201](https://devhub.checkmarx.com/cve-details/CVE-2024-22201?utm_source=jetbrains&utm_medium=referral) 7.5 Uncontrolled Resource Consumption vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
qodana
Unexpected input(s) 'args', valid inputs are ['java-version', 'java-version-file', 'distribution', 'java-package', 'architecture', 'jdkFile', 'check-latest', 'server-id', 'server-username', 'server-password', 'settings-path', 'overwrite-settings', 'gpg-private-key', 'gpg-passphrase', 'cache', 'cache-dependency-path', 'job-status', 'token', 'mvn-toolchain-id', 'mvn-toolchain-vendor']
qodana
Unexpected input(s) 'args', valid inputs are ['java-version', 'java-version-file', 'distribution', 'java-package', 'architecture', 'jdkFile', 'check-latest', 'server-id', 'server-username', 'server-password', 'settings-path', 'overwrite-settings', 'gpg-private-key', 'gpg-passphrase', 'cache', 'cache-dependency-path', 'job-status', 'token', 'mvn-toolchain-id', 'mvn-toolchain-vendor']
Vulnerable declared dependency: server/build.gradle#L62
Provides transitive vulnerable dependency maven:io.netty:netty-codec-http2:4.1.94.Final * [CVE-2023-44487](https://devhub.checkmarx.com/cve-details/CVE-2023-44487?utm_source=jetbrains&utm_medium=referral) 5.3 Uncontrolled Resource Consumption vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)