Functionality Abuse
Supply Chain Attack - Gradle
Description The declaration in the property files does not guarantee the integrity of the gradle wrapper which may compromise the compilation which in turn may be affected by malicious code that may be hidden in the compromised third party code. ...
Insecure service configuration - Azure
Description An insecure configuration of the Azure service can cause an impact on the service. Impact Affectation to the availability of the service. Recommendation Configure as securely as possible the service. Threat Unauthenticated attacker with ...
Bucket takeover
Description It is evident in code that there are AWS S3 buckets that are not registered, making it possible for an attacker to hijack them. Impact - Affect services that make use of the buckets. - Perform phishing attacks by creating fake websites. ...
Sensitive Information in Auto-Generated Screenshots
Description A screenshot of the current activity is taken when an app goes into background and displayed for aesthetic purposes when the app returns to the foreground. However, this may leak sensitive information. Impact - Leak sensitive information. ...
Insecure service configuration - Business logic
Description Weaknesses in business logic become apparent in the design and implementation of an application, allowing an attacker to trigger unwanted behavior. an attacker to trigger unwanted behavior. This opens the possibility for attackers to ...
Supply Chain Attack - GitHub Actions
Description In the Git Hub actions if they do not have their actions locked for a specific revision, if a malicious change is made to a third party action, this change will be included in the next build that is run for any project that uses that ...
Inappropriate coding practices - relative path command
Description Files are found that reference executables within the system that make use of relative path definition. When a binary that makes use of relative paths is executed, they call the executables of environment variables or PATH, which an ...
Supply Chain Attack - Lock Files
Description A lock file has not been defined to validate the integrity of the software to be used. This can lead to a supply chain attack if the software is compromised, such as by injecting malware. Impact Override dependencies or component with ...
Inappropriate coding practices - invalid file
Description Files are stored in the repository that cannot be verified because their content is not compatible with their extension. Impact - Difficult security auditing process. - Cause an inadequate operation in the different applications that make ...
Supply Chain Attack - Kubernetes
Description Kubernetes dependencies are not pinned to an exact digest, making the docker build unable the verify the integrity of the image and allowing a malicious actor to override the used components with malicious components without leaving a ...
Inappropriate coding practices - System exit
Description The J2EE application use System.exit(), it is undesirable for a web application to attempt to shut down the application container. Accessing a function that can shut down the application is an avenue for denial of service (DoS) attacks. ...
Password reset poisoning
Description The application generates password reset links improperly, allowing an attacker to manipulate the request by changing the domain to one under his control. Impact Compromising user accounts. Recommendation Ensure that password change URLs ...
Traceability Loss - Kubernetes
Description The kubernetes configuration does not set a logging property, which prevents log files from being created. These files are useful for identifying and tracking malicious actions or anomalous behavior. Alternatively, log files do not have ...
Insecure service configuration - Docker
Description Using the ADD command to automatically extract files to the destination directory adds the risk of exploiting vulnerabilities such as zip bombs and Zip Slip that could then be activated automatically. Impact Expose the system to zip-based ...
Account Takeover
Description By exploiting one or several application vulnerabilities it is possible to take control over a user account and perform action on his behalf Impact - Affect the traceability and non-repudiation of the user's actions. - Deny the access of ...
XAML injection
Description The application does not properly validate user input, allowing XamlReader instances to be manipulated to generate malicious elements that can interact with other system actors Impact Create malicious elements that can produce more severe ...
Insecure service configuration - Container level access policy
Description Container level policy is not set when generating a service Shared Access Signature (SAS). A container-level access policy can be modified or revoked at any time. It provides greater flexibility and control over the permissions that are ...
Insecure service configuration - Header Checking
Description The application disables the HeaderChecking property, which enables the encoding of newlines and carriage returns, thus allowing the injection of malicious headers Impact Ease header injection attacks through newlines and carriage returns ...
Insecure file upload - DLL Injection
Description The application does not properly validate the DLL files, allowing the injection of malicious DLLS Impact Inject backdoors, virus, or other types of malicious files into the application Recommendation - Verify with an antivirus that the ...
Lack of protection against deletion - Azure Key Vault
Description Some Azure Key Vaults instances do not enable properties that allow secrets to be recovered in the event of accidental deletion or by malicious actors. Impact Delete sensitive secrets by accident with no chance of recovery Recommendation ...
Insecure encryption algorithm - Default encryption
Description Some Amazon services support Key Management Service (KMS). As a good practice, it is recommended to use Customer Controlled Keys (CMK) instead of the default keys, in order to take full advantage of the KMS service. Impact - Obtain ...
Dependency Confusion
Description The application incorrectly defines the dependencies to be used. This generates some ambiguity that can be used by an attacker to confuse the package manager in charge of installing or updating the project's dependencies, with the aim of ...
Excessive privileges - Access Mode
Description The system files or directories have an access mode too permissive Impact - Read, write or execute files - Create potentially harmful files Recommendation System files and directories must be restricted by a custom permission mask, for ...
OS Command Injection
Description The application allows the execution of functions or methods which execute commands in the system with non-sanitized parameters. This action would allow an attacker to inject malicious commands in the server to highly increase the attack ...
Insecure service configuration - usesCleartextTraffic
Description The application has android:usesCleartextTraffic set to true, which allows it to access resources that do not use encryption, a situation that could be exploited by an attacker to perform MitM attacks and compromise the confidentiality ...
Traceability Loss - Azure
Description The Azure configurations do not enable the log service with enough granularity. Omitting relevant information may hinder the detection of anomalous behaviors or security breaches. Impact Hinder the detection of security issues. ...
Insecure service configuration - AKV Secret Expiration
Description The secrets stored in Azure Key Vault do not set an expiration date. Impact Increase the chances of compromising sensitive secrets of the system. Recommendation Define an expiration date for Azure secrets by setting the expiration_date ...
Traceability Loss - AWS
Description Some AWS services (Such as EC2, ELB or S3) do not correctly set the logging property, which avoids the recording of log files. These files are useful to identify and trace malicious actions or anomalous behaviors. Alternatively, the log ...
Security controls absence - Monitoring
Description The application lacks of alert or notification mechanisms in the presence of critical changes in the system, such as: access and modification of resources, roles creation, among others. Impact Perform potentially harmful operations in the ...
Fragment Injection
Description The application is vulnerable to Fragment Injection caused either by an unsafe implementation of PreferenceActivity or an insecure configuration of isValidFragment. Impact Use malicious fragments to exploit different vulnerabilities. ...
Insecure service configuration - KMS
Description The automatic key rotation for the KMS service is disabled. By keeping static keys during long periods the chances to compromise a valid key are higher. Impact Increase the chance to get valid keys. Recommendation Enable the automatic key ...
Insecure generation of random numbers - Static IV
Description The application uses static, hardcoded values for initialization vectors. By knowing initialization vectors an attacker could perform a reverse engineering attack to predict the random values that should remain as secrets. Impact Predict ...
Insufficient data authenticity validation - Cloudtrail Logs
Description One or more Cloudtrail instances do not enable the EnableLogFileValidation attribute avoiding the integrity validation to be performed. This practice could aid an attacker to inject malicious information in log files without raising any ...
Use of software with known vulnerabilities in development
Description The system uses the version of a software or dependency with known vulnerabilities in pre-productive environments. Impact Exploit public vulnerabilities of the components in the affected environments. Recommendation - Update the affected ...
Security controls bypass or absence - Firewall
Description The firewall security verifications either do not exist or can be bypassed. Impact Bypass security validations to perform different attacks. Recommendation Guarantee that firewall security mechanisms and access rules are active and cannot ...
Inappropriate coding practices - Unused properties
Description The application source code defines properties that are not used, adding unnecessary complexity to the source code and leading to a suboptimal state that may cause affectations to the overall application performance. Impact - Hinder the ...
Insecure service configuration - Object Reutilization
Description The system does not validate that objects, data or information, valid for one use only can be reused. Impact Abuse functionalities that should be accessed once. Recommendation Implement validations to guarantee that One-Time data. cannot ...
Cross-Site Leak - Frame Counting
Description It is possible to determine from an external site whether or not a user is logged into the platform by counting the frames loaded when opening the page. The user must have logged into a site with a malicious frame counting script. Impact ...
Inappropriate coding practices - Wildcard export
Description When exporting libraries, the wildcard operator (asterisk) is used, which exports all the functions of that library. This is a bad practice that complicates the use and maintenance of the module. Impact - Export functions and procedures ...
Insufficient data authenticity validation - Front bypass
Description The credentials policy present in the system warns that these cannot be consecutive and/or repeated numbers, however this validation is only done in the front end of the application, so it is possible to modify the password from the same ...
Next page