-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Python migration #1
Conversation
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
if request.method == "POST": | ||
username = request.form["username"] | ||
password = request.form["password"] | ||
print("logging in user {}:{}", username, password) |
Check failure
Code scanning / Fortify on Demand
Privacy Violation
if request.method == "POST": | ||
username = request.form["username"] | ||
password = request.form["password"] | ||
print("logging in user {}:{}", username, password) |
Check failure
Code scanning / Fortify on Demand
Privacy Violation
arguments = request.args.get('arguments') | ||
home = os.getenv('APPHOME') | ||
cmd = home.join(INITCMD).join(arguments) | ||
os.system(cmd); |
Check failure
Code scanning / Fortify on Demand
Command Injection
return response | ||
|
||
def source(script_path): | ||
with open(script_path, 'r') as script_file: |
Check failure
Code scanning / Fortify on Demand
Path Manipulation
products = db.execute( | ||
"SELECT *" | ||
" FROM products p" | ||
" WHERE name LIKE '%%" + keywords + "%%'" |
Check failure
Code scanning / Fortify on Demand
SQL Injection
entries = [] | ||
entry = {'id': id, 'name': name, 'email': email, 'role' : role} | ||
entries.append(entry) | ||
json.dump(entries, f) |
Check failure
Code scanning / Fortify on Demand
JSON Injection
entries = [] | ||
entry = {'id': id, 'name': name, 'email': email, 'role' : role} | ||
entries.append(entry) | ||
json.dump(entries, f) |
Check failure
Code scanning / Fortify on Demand
JSON Injection
entries = [] | ||
entry = {'id': id, 'name': name, 'email': email, 'role' : role} | ||
entries.append(entry) | ||
json.dump(entries, f) |
Check failure
Code scanning / Fortify on Demand
JSON Injection
if not filename: | ||
return 404 | ||
site_root = os.path.realpath(os.path.dirname(__file__)) | ||
return send_file(os.path.join(site_root, "static", "data", filename2)) |
Check failure
Code scanning / Fortify on Demand
Path Manipulation
else: | ||
template = request.form.get('template') | ||
filename = request.form.get('filename') | ||
t = Jinja2_Template(template) |
Check failure
Code scanning / Fortify on Demand
Server-Side Template Injection
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fortify vulnerability summary
New Issues
- No new or re-introduced issues were detected
Removed Issues
-
Fix Validated (Static): app/utils/email.py:11 - Password Management: Empty Password
-
Fix Validated (Static): app/insecure.py:77 - Path Manipulation
-
Fix Validated (Static): app/insecure.py:53 - Server-Side Template Injection
Migrating the application to use Python Flask.