-
Notifications
You must be signed in to change notification settings - Fork 18
Description
Code Security Report
Scan Metadata
Latest Scan: 2025-01-15 05:58pm
Total Findings: 7 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 292
Detected Programming Languages: 3 (Python*, JavaScript / TypeScript*, C/C++ (Beta))
- Check this box to manually trigger a scan
Finding Details
| Severity | Vulnerability Type | CWE | File | Data Flows | Detected | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| DOM Based Cross-Site Scripting | 1 | 2025-01-15 06:01pm | |||||||||||||||||||||
| |||||||||||||||||||||||
| window.onload = function () { | |
| const link = document.createElement("a"); | |
| link.classList.add("muted-link"); | |
| link.classList.add("github-issue-link"); | |
| link.text = "Give feedback"; | |
| link.href = ( |
1 Data Flow/s detected
| + `*Reported+from%3A+${location.href}*` |
| "https://github.com/canonical/cloud-init/issues/new?" |
| link.href = ( |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior DOM Based Cross-Site Scripting Training
● Videos
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hardcoded Password/Credentials Training
● Videos
▪ Secure Code Warrior Hardcoded Password/Credentials Video
● Further Reading
▪ OWASP Top Ten 2017 A3: Sensitive Data Exposure
▪ OWASP Top Ten Proactive Controls 2018 C8: Protect Data Everywhere
Vulnerable Code
Lines 381 to 386 in 5c771b5
| } | |
| return functools.partial(base_func, **kwargs) | |
| def _do_response(self): | |
| who = self.client_address | |
| log.info("Got a call from %s for path %s", who, self.path) |
1 Data Flow/s detected
Line 386 in 5c771b5
| log.info("Got a call from %s for path %s", who, self.path) |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Log Forging Training
● Videos
▪ Secure Code Warrior Log Forging Video
● Further Reading
Vulnerable Code
cloud-init/.pc/revert-551f560d-cloud-config-after-snap-seeding.patch/cloudinit/util.py
Lines 1872 to 1877 in 5c771b5
| """Hash the content of a binary buffer using SHA1. | |
| @param f: buffered binary stream to hash. | |
| @return: digested data as bytes. | |
| """ | |
| hasher = hashlib.sha1() |
1 Data Flow/s detected
cloud-init/.pc/revert-551f560d-cloud-config-after-snap-seeding.patch/cloudinit/util.py
Line 1877 in 5c771b5
| hasher = hashlib.sha1() |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Weak Hash Strength Training
● Videos
▪ Secure Code Warrior Weak Hash Strength Video
● Further Reading
▪ OWASP Cryptographic Storage Cheat Sheet
▪ OWASP Transport Layer Protection Cheat Sheet
▪ OWASP Password Storage Cheat Sheet
▪ OWASP Using a broken or risky cryptographic algorithm article
Vulnerable Code
Lines 1882 to 1887 in 5c771b5
| """Hash the content of a binary buffer using SHA1. | |
| @param f: buffered binary stream to hash. | |
| @return: digested data as bytes. | |
| """ | |
| hasher = hashlib.sha1() |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Weak Hash Strength Training
● Videos
▪ Secure Code Warrior Weak Hash Strength Video
● Further Reading
▪ OWASP Cryptographic Storage Cheat Sheet
▪ OWASP Transport Layer Protection Cheat Sheet
▪ OWASP Password Storage Cheat Sheet
▪ OWASP Using a broken or risky cryptographic algorithm article
Vulnerable Code
cloud-init/.pc/no-nocloud-network.patch/cloudinit/util.py
Lines 1872 to 1877 in 5c771b5
| """Hash the content of a binary buffer using SHA1. | |
| @param f: buffered binary stream to hash. | |
| @return: digested data as bytes. | |
| """ | |
| hasher = hashlib.sha1() |
1 Data Flow/s detected
| hasher = hashlib.sha1() |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Weak Hash Strength Training
● Videos
▪ Secure Code Warrior Weak Hash Strength Video
● Further Reading
▪ OWASP Cryptographic Storage Cheat Sheet
▪ OWASP Transport Layer Protection Cheat Sheet
▪ OWASP Password Storage Cheat Sheet
▪ OWASP Using a broken or risky cryptographic algorithm article
Vulnerable Code
Lines 351 to 356 in 5c771b5
| func_mapping = { | |
| "user-data": user_fetcher.get_data, | |
| "meta-data": meta_fetcher.get_data, | |
| } | |
| segments = [piece for piece in path.split("/") if len(piece)] | |
| log.info("Received segments %s", segments) |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Log Forging Training
● Videos
▪ Secure Code Warrior Log Forging Video
● Further Reading