gitlab.find_sec_bugs.JAXWS_ENDPOINT-1
unknown
Download Count*
License
This method is part of a SOAP Web Service (JSR224). The security of this web service should be analyzed; Authentication, if enforced, should be tested. Access control, if enforced, should be tested. The inputs should be tracked for potential vulnerabilities. The communication should ideally be over SSL.
Run Locally
Run in CI
Defintion
rules:
- id: find_sec_bugs.JAXWS_ENDPOINT-1
mode: taint
pattern-sources:
- patterns:
- pattern-inside: |
@javax.jws.WebMethod(...)
$TYPE $FUNC(..., $VAR, ...) {
...
}
- pattern: $VAR
pattern-sanitizers:
- patterns:
- pattern-inside: |
$STR.replaceAll("$REPLACE_CHAR", "$REPLACER");
...
- pattern: $STR
- metavariable-regex:
metavariable: $REPLACER
regex: .*^(CRLF).*
- metavariable-regex:
metavariable: $REPLACE_CHAR
regex: (*CRLF)
- pattern: org.apache.commons.text.StringEscapeUtils.unescapeJava(...);
pattern-sinks:
- pattern: return ...;
message: >
This method is part of a SOAP Web Service (JSR224). The security of this
web service should be
analyzed; Authentication, if enforced, should be tested. Access control, if enforced, should be
tested. The inputs should be tracked for potential vulnerabilities. The communication should
ideally be over SSL.
languages:
- java
severity: INFO
metadata:
category: security
cwe: "CWE-20: Improper Input Validation"
owasp: "OWASP: Cross-Site Request Forgery"
technology:
- java
primary_identifier: find_sec_bugs.JAXWS_ENDPOINT-1
secondary_identifiers:
- name: Find Security Bugs-JAXWS_ENDPOINT
type: find_sec_bugs_type
value: JAXWS_ENDPOINT
license: MIT
Short Link: https://sg.run/3Qjl