Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CX Security_Misconfiguration @ server.js [master] #3

Open
tsunez opened this issue Sep 1, 2020 · 4 comments
Open

CX Security_Misconfiguration @ server.js [master] #3

tsunez opened this issue Sep 1, 2020 · 4 comments

Comments

@tsunez
Copy link
Collaborator

tsunez commented Sep 1, 2020

Security_Misconfiguration issue exists @ server.js in branch master

The application takes sensitive, personal data "keyboard cat", found at line 25 of server.js, and stores it in an unprotected manner, without encryption, to session at line 24 of server.js.

Severity: High

CWE:933

Vulnerability details and guidance

Checkmarx

Recommended Fix

Lines: 25


Code (Line #25):

  secret: 'keyboard cat',

@tsunez
Copy link
Collaborator Author

tsunez commented Sep 1, 2020

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)

3 similar comments
@tsunez
Copy link
Collaborator Author

tsunez commented Sep 1, 2020

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)

@tsunez
Copy link
Collaborator Author

tsunez commented Sep 2, 2020

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)

@tsunez
Copy link
Collaborator Author

tsunez commented Sep 2, 2020

Issue still exists.

SUMMARY

Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant