gitlab.find_sec_bugs.JAXWS_ENDPOINT-1

unknown
Download Count*
License

This method is part of a SOAP Web Service (JSR224). The security of this web service should be analyzed; Authentication, if enforced, should be tested. Access control, if enforced, should be tested. The inputs should be tracked for potential vulnerabilities. The communication should ideally be over SSL.

Run Locally

Run in CI

Defintion

rules:
  - id: find_sec_bugs.JAXWS_ENDPOINT-1
    mode: taint
    pattern-sources:
      - patterns:
          - pattern-inside: |
              @javax.jws.WebMethod(...)
              $TYPE $FUNC(..., $VAR, ...) {
                ...
              }
          - pattern: $VAR
    pattern-sanitizers:
      - patterns:
          - pattern-inside: |
              $STR.replaceAll("$REPLACE_CHAR", "$REPLACER");
              ...
          - pattern: $STR
          - metavariable-regex:
              metavariable: $REPLACER
              regex: .*^(CRLF).*
          - metavariable-regex:
              metavariable: $REPLACE_CHAR
              regex: (*CRLF)
      - pattern: org.apache.commons.text.StringEscapeUtils.unescapeJava(...);
    pattern-sinks:
      - pattern: return ...;
    message: >
      This method is part of a SOAP Web Service (JSR224). The security of this
      web service should be

      analyzed; Authentication, if enforced, should be tested. Access control, if enforced, should be

      tested. The inputs should be tracked for potential vulnerabilities. The communication should

      ideally be over SSL.
    languages:
      - java
    severity: INFO
    metadata:
      category: security
      cwe: "CWE-20: Improper Input Validation"
      owasp: "OWASP: Cross-Site Request Forgery"
      technology:
        - java
      primary_identifier: find_sec_bugs.JAXWS_ENDPOINT-1
      secondary_identifiers:
        - name: Find Security Bugs-JAXWS_ENDPOINT
          type: find_sec_bugs_type
          value: JAXWS_ENDPOINT
      license: MIT