path
stringlengths 7
151
| cwe
stringclasses 371
values | vuln
stringlengths 5
197k
| vuln_desc
stringlengths 4
7.39k
| severity
stringclasses 5
values | code
stringlengths 0
487k
| scanner
stringclasses 7
values | status
stringclasses 3
values | gpt_status
stringclasses 4
values |
---|---|---|---|---|---|---|---|---|
/base/pgadmin/7.6/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "pgadmin4" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/local/lib/python3.10/site-packages/pgadmin4
CMD [ "pgadmin4" ] | SAST | Unverified | True Positive |
/base/php/5.3-apache/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["docker-php-entrypoint"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 80
ENTRYPOINT ["docker-php-entrypoint"]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/php/5.3-apache/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["apache2-foreground"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["docker-php-entrypoint"]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/php/5.4.1/apache/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["docker-php-entrypoint"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 80
ENTRYPOINT ["docker-php-entrypoint"]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/php/5.4.1/apache/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["apache2-foreground"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["docker-php-entrypoint"]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/php/5.4.1/cgi/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["apache2-foreground"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 80
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/php/5.4.1/cli/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["docker-php-entrypoint"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-php-* /usr/local/bin/
ENTRYPOINT ["docker-php-entrypoint"]
CMD ["php", "-a"] | SAST | Unverified | True Positive |
/base/php/5.4.1/cli/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["php", "-a"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["docker-php-entrypoint"]
CMD ["php", "-a"] | SAST | Unverified | True Positive |
/base/php/8.1-backdoor/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /var/www/html
CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"] | SAST | Unverified | True Positive |
/base/php/xxe/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /var/www/html
CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"] | SAST | Unverified | True Positive |
/base/polkit/0.105/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD qemu-system-x86_64 \
-drive "file=ubuntu-20.04-server-cloudimg-amd64.img,format=qcow2" \
-drive "file=user-data.img,format=raw" \
-m 2G \
-nic user,model=virtio,hostfwd=tcp:0.0.0.0:2222-:22 \
-smp $(nproc) \
-nographic \
-monitor null | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 2222
CMD qemu-system-x86_64 \
-drive "file=ubuntu-20.04-server-cloudimg-amd64.img,format=qcow2" \
-drive "file=user-data.img,format=raw" \
-m 2G \
-nic user,model=virtio,hostfwd=tcp:0.0.0.0:2222-:22 \
-smp $(nproc) \
-nographic \
-monitor null | SAST | Unverified | True Positive |
/base/postgres/9.6.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /usr/local/bin/
RUN ln -s usr/local/bin/docker-entrypoint.sh / # backwards compat
ENTRYPOINT ["docker-entrypoint.sh"]
EXPOSE 5432
CMD ["postgres"] | SAST | Unverified | False Positive |
/base/postgres/9.6.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["postgres"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 5432
CMD ["postgres"] | SAST | Unverified | True Positive |
/base/rails/5.0.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && bundle install
CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"] | SAST | Unverified | True Positive |
/base/rails/5.2.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && bundle install
CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"] | SAST | Unverified | True Positive |
/base/redis/5.0.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["redis-server", "/etc/redis/redis.conf"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && sed -i 's|logfile .*|logfile /dev/stdout|g' /etc/redis/redis.conf
CMD ["redis-server", "/etc/redis/redis.conf"] | SAST | Unverified | True Positive |
/base/rocketmq/5.1.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9876 10911 5005 8080 8081
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["mqbroker", "-n", "localhost:9876", "--enable-proxy"] | SAST | Unverified | True Positive |
/base/rocketmq/5.1.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mqbroker", "-n", "localhost:9876", "--enable-proxy"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["mqbroker", "-n", "localhost:9876", "--enable-proxy"] | SAST | Unverified | True Positive |
/base/saltstack/2019.2.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/usr/bin/dumb-init"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY saltinit.py /usr/local/bin/saltinit
ENTRYPOINT ["/usr/bin/dumb-init"]
CMD ["/usr/local/bin/saltinit"]
EXPOSE 22 4505 4506 8000 | SAST | Unverified | True Positive |
/base/saltstack/2019.2.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/usr/local/bin/saltinit"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY saltinit.py /usr/local/bin/saltinit
ENTRYPOINT ["/usr/bin/dumb-init"]
CMD ["/usr/local/bin/saltinit"]
EXPOSE 22 4505 4506 8000
RUN salt-run salt.cmd tls.create_self_signed_cert | SAST | Unverified | True Positive |
/base/saltstack/3002/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/usr/bin/dumb-init"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY saltinit.py /usr/local/bin/saltinit
ENTRYPOINT ["/usr/bin/dumb-init"]
CMD ["/usr/local/bin/saltinit"]
EXPOSE 22 4505 4506 8000 | SAST | Unverified | True Positive |
/base/saltstack/3002/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/usr/local/bin/saltinit"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY saltinit.py /usr/local/bin/saltinit
ENTRYPOINT ["/usr/bin/dumb-init"]
CMD ["/usr/local/bin/saltinit"]
EXPOSE 22 4505 4506 8000
RUN salt-run salt.cmd tls.create_self_signed_cert | SAST | Unverified | True Positive |
/base/scrapyd/1.2.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["scrapyd", "-u", "nobody", "-g", "nogroup"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 6800
CMD ["scrapyd", "-u", "nobody", "-g", "nogroup"] | SAST | Unverified | False Positive |
/base/shiro/1.0.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/shiro/1.0.0/code/src/main/java/org/vulhub/shirodemo/UserController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/admin") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | }
@RequestMapping("/admin")
public String helloPage() {
return "admin";
} | SAST | Unverified | True Positive |
/base/shiro/1.0.0/code/src/main/java/org/vulhub/shirodemo/UserController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/unauth") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | }
@RequestMapping("/unauth")
public String errorPage() {
return "error";
} | SAST | Unverified | False Positive |
/base/shiro/1.0.0/code/src/main/java/org/vulhub/shirodemo/UserController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/login") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | }
@RequestMapping("/login")
public String loginPage() {
return "login";
} | SAST | Unverified | False Positive |
/base/shiro/1.0.0/code/src/main/resources/templates/login.html | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | <form class="form-signin" action="/doLogin" method="post">
<h1 class="h3 mb-3 font-weight-normal">Please sign in</h1>
<label class="sr-only">Username</label>
<input type="text" class="form-control" placeholder="Username" name="username" required>
<label class="sr-only">Password</label>
<input type="password" class="form-control" placeholder="Password" name="password" required>
<div class="checkbox mb-3">
<label>
<input type="checkbox" name="rememberme" value="remember-me"> Remember me
</label>
</div>
<button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button>
</form> | Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks. | MEDIUM | </head>
<body class="text-center">
<form class="form-signin" action="/doLogin" method="post">
<h1 class="h3 mb-3 font-weight-normal">Please sign in</h1>
<label class="sr-only">Username</label>
<input type="text" class="form-control" placeholder="Username" name="username" required>
<label class="sr-only">Password</label>
<input type="password" class="form-control" placeholder="Password" name="password" required>
<div class="checkbox mb-3">
<label>
<input type="checkbox" name="rememberme" value="remember-me"> Remember me
</label>
</div>
<button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button>
</form>
</body>
</html> | SAST | Unverified | False Positive |
/base/shiro/1.2.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/shiro/1.2.4/code/src/main/java/org/vulhub/shirodemo/UserController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | }
@RequestMapping("/")
public String helloPage() {
return "hello";
} | SAST | Unverified | False Positive |
/base/shiro/1.2.4/code/src/main/java/org/vulhub/shirodemo/UserController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/unauth") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | }
@RequestMapping("/unauth")
public String errorPage() {
return "error";
} | SAST | Unverified | False Positive |
/base/shiro/1.2.4/code/src/main/java/org/vulhub/shirodemo/UserController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/login") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | }
@RequestMapping("/login")
public String loginPage() {
return "login";
} | SAST | Unverified | True Positive |
/base/shiro/1.2.4/code/src/main/resources/templates/login.html | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | <form class="form-signin" action="/doLogin" method="post">
<h1 class="h3 mb-3 font-weight-normal">Please sign in</h1>
<label class="sr-only">Username</label>
<input type="text" class="form-control" placeholder="Username" name="username" required>
<label class="sr-only">Password</label>
<input type="password" class="form-control" placeholder="Password" name="password" required>
<div class="checkbox mb-3">
<label>
<input type="checkbox" name="rememberme" value="remember-me"> Remember me
</label>
</div>
<button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button>
</form> | Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks. | MEDIUM | </head>
<body class="text-center">
<form class="form-signin" action="/doLogin" method="post">
<h1 class="h3 mb-3 font-weight-normal">Please sign in</h1>
<label class="sr-only">Username</label>
<input type="text" class="form-control" placeholder="Username" name="username" required>
<label class="sr-only">Password</label>
<input type="password" class="form-control" placeholder="Password" name="password" required>
<div class="checkbox mb-3">
<label>
<input type="checkbox" name="rememberme" value="remember-me"> Remember me
</label>
</div>
<button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button>
</form>
</body>
</html> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/AccountInfoController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/admin/") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | public class AccountInfoController {
@RequestMapping("/admin/")
public String home(Model model) {
String name = "World"; | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/HelloController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | @SuppressWarnings("Duplicates")
@RequestMapping("/")
public String home(HttpServletRequest request, Model model) {
String name = "World"; | SAST | Unverified | False Positive |
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/LoginController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/login.html") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | public class LoginController {
@RequestMapping("/login.html")
public String loginTemplate() {
return "login"; | SAST | Unverified | False Positive |
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/RestrictedErrorController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping(ERROR_PATH) | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | }
@RequestMapping(ERROR_PATH)
String error(HttpServletRequest request, Model model) {
Map<String, Object> errorMap = errorAttributes.getErrorAttributes(new ServletWebRequest(request), false);
model.addAttribute("errors", errorMap); | SAST | Unverified | False Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/account-info.html | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | <form id="logoutForm" th:action="@{/logout}" method="post">
<input type="submit" class="btn btn-danger" value="Logout"/>
</form> | Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks. | MEDIUM | <a th:href="@{/}" class="btn btn-primary">Home</a>
<form id="logoutForm" th:action="@{/logout}" method="post">
<input type="submit" class="btn btn-danger" value="Logout"/>
</form>
</div>
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> | SAST | Unverified | False Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/account-info.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | </div>
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
</body>
</html> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/account-info.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | </div>
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
</body>
</html> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html | ['CWE-353: Missing Support for Integrity Check'] | <link href="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css" rel="stylesheet" type="text/css"/> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <meta name="viewport" content="width=device-width"/>
<link href="https://fonts.googleapis.com/css?family=Open+Sans:300italic,300,400italic,400,600italic,600,700italic,700,800italic,800" rel="stylesheet" type="text/css"/>
<link href="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css" rel="stylesheet" type="text/css"/>
<style>
body { | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.2/html5shiv.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.2/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
<![endif]-->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.2/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
<![endif]-->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
<![endif]-->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
</head>
<body> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <![endif]-->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
</head>
<body>
<p>Nothing to see here, move along.</p> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/hello.html | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | <form id="logoutForm" th:action="@{/logout}" method="post">
<input type="submit" class="btn btn-danger" value="Logout"/>
</form> | Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks. | MEDIUM | <div th:if="${subject.authenticated}">
<h4 th:text="'Principal: ' + ${subject.principal}"></h4>
<form id="logoutForm" th:action="@{/logout}" method="post">
<input type="submit" class="btn btn-danger" value="Logout"/>
</form>
</div>
<h4><a th:href="@{/admin/}" class="btn btn-primary">Account info</a> (Requires authenticated.)</h4> | SAST | Unverified | False Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/hello.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | </div>
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
</body>
</html> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/hello.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | </div>
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
</body>
</html> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/login.html | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | <form name="loginform" action="" method="POST" accept-charset="UTF-8" role="form">
<fieldset>
<div class="form-group">
<input class="form-control" placeholder="Username or Email" name="username" type="text"/>
</div>
<div class="form-group">
<input class="form-control" placeholder="Password" name="password" type="password" value=""/>
</div>
<input class="btn btn-lg btn-success btn-block" type="submit" value="Login"/>
</fieldset>
</form> | Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks. | MEDIUM | </div>
<div class="panel-body">
<form name="loginform" action="" method="POST" accept-charset="UTF-8" role="form">
<fieldset>
<div class="form-group">
<input class="form-control" placeholder="Username or Email" name="username" type="text"/>
</div>
<div class="form-group">
<input class="form-control" placeholder="Password" name="password" type="password" value=""/>
</div>
<input class="btn btn-lg btn-success btn-block" type="submit" value="Login"/>
</fieldset>
</form>
</div>
</div>
</div> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/login.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://code.jquery.com/jquery.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <!-- jQuery (necessary for Bootstrap's JavaScript plugins) -->
<script src="https://code.jquery.com/jquery.js"></script>
<script src="//netdna.bootstrapcdn.com/bootstrap/3.0.2/js/bootstrap.min.js"></script>
<!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!-- WARNING: Respond.js doesn't work if you view the page via file:// --> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/login.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="//netdna.bootstrapcdn.com/bootstrap/3.0.2/js/bootstrap.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <!-- jQuery (necessary for Bootstrap's JavaScript plugins) -->
<script src="https://code.jquery.com/jquery.js"></script>
<script src="//netdna.bootstrapcdn.com/bootstrap/3.0.2/js/bootstrap.min.js"></script>
<!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
<!--[if lt IE 9]> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/login.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script>
<![endif]-->
</body> | SAST | Unverified | True Positive |
/base/shiro/1.5.1/code/src/main/resources/templates/login.html | ['CWE-353: Missing Support for Integrity Check'] | <script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script>
<![endif]-->
</body>
</html> | SAST | Unverified | True Positive |
/base/skywalking/8.3.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD bin/web-server.sh | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR ${BASEDIR}
CMD bin/web-server.sh | SAST | Unverified | True Positive |
/base/solr/7.0.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV PATH="$PATH:/opt/solr/bin"
WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/7.0.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.1.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV PATH="$PATH:/opt/solr/bin"
WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.1.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.11.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV PATH="$PATH:/opt/solr/bin"
WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.11.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.2.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV PATH="$PATH:/opt/solr/bin"
WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.2.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.3.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV PATH="$PATH:/opt/solr/bin"
WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.3.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.6.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV PATH="$PATH:/opt/solr/bin"
WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.6.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.8.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV PATH="$PATH:/opt/solr/bin"
WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/solr/8.8.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/solr
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"] | SAST | Unverified | True Positive |
/base/spark/2.3.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /docker-entrypoint.sh
ENTRYPOINT [ "/docker-entrypoint.sh" ]
CMD [ "master" ] | SAST | Unverified | True Positive |
/base/spark/2.3.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "master" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT [ "/docker-entrypoint.sh" ]
CMD [ "master" ] | SAST | Unverified | True Positive |
/base/spring/spring-cloud-function/3.2.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-cloud-function-sample-0.0.1-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY --from=builder /usr/src/target/spring-cloud-function-sample-0.0.1-SNAPSHOT.jar /spring-cloud-function-sample-0.0.1-SNAPSHOT.jar
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-cloud-function-sample-0.0.1-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/spring/spring-cloud-gateway/3.1.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/spring-cloud-gateway-0.0.1-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY --from=builder /usr/src/target/spring-cloud-gateway-0.0.1-SNAPSHOT.jar /spring-cloud-gateway-0.0.1-SNAPSHOT.jar
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/spring-cloud-gateway-0.0.1-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/spring/spring-data-commons/2.0.5/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-data-web-example-2.0.0.RELEASE.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY --from=builder /usr/src/target/spring-data-web-example-2.0.0.RELEASE.jar /spring-data-web-example-2.0.0.RELEASE.jar
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-data-web-example-2.0.0.RELEASE.jar"] | SAST | Unverified | True Positive |
/base/spring/spring-data-commons/2.0.5/src/main/resources/templates/users.html | ['CWE-353: Missing Support for Integrity Check'] | <link rel="stylesheet" href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.2/css/bootstrap.min.css" /> | This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files. | MEDIUM | <title>Users</title>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<link rel="stylesheet" href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.2/css/bootstrap.min.css" />
<link rel="stylesheet" th:href="@{/css/style.css}" type="text/css" />
</head>
<body> | SAST | Unverified | True Positive |
/base/spring/spring-data-commons/2.0.5/src/main/resources/templates/users.html | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | <form method="post" role="form" class="gb-form" id="form" th:action="@{/users(page=${page},size=${users.size})}" th:object="${userForm}">
<ul th:if="${#fields.hasErrors('*')}" class="errors" >
<li th:each="error : ${#fields.errors('*')}" th:text="${error}" class="text-danger">Input is incorrect</li>
</ul>
<div class="form-group">
<label for="username">Username</label><br />
<input type="text" th:field="*{username}" class="form-control" th:errorclass="fieldError" required="required" />
</div>
<div class="form-group">
<label for="password">Password</label><br />
<input type="password" th:field="*{password}" class="form-control" th:errorclass="fieldError" required="required" />
</div>
<div class="form-group">
<label for="repeatedPassword">Password (repeated)</label><br />
<input type="password" th:field="*{repeatedPassword}" class="form-control" th:errorclass="fieldError" required="required" />
</div>
<input type="submit" class="btn btn-default" value="Register user" />
</form> | Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks. | MEDIUM | </ol>
<form method="post" role="form" class="gb-form" id="form" th:action="@{/users(page=${page},size=${users.size})}" th:object="${userForm}">
<ul th:if="${#fields.hasErrors('*')}" class="errors" >
<li th:each="error : ${#fields.errors('*')}" th:text="${error}" class="text-danger">Input is incorrect</li>
</ul>
<div class="form-group">
<label for="username">Username</label><br />
<input type="text" th:field="*{username}" class="form-control" th:errorclass="fieldError" required="required" />
</div>
<div class="form-group">
<label for="password">Password</label><br />
<input type="password" th:field="*{password}" class="form-control" th:errorclass="fieldError" required="required" />
</div>
<div class="form-group">
<label for="repeatedPassword">Password (repeated)</label><br />
<input type="password" th:field="*{repeatedPassword}" class="form-control" th:errorclass="fieldError" required="required" />
</div>
<input type="submit" class="btn btn-default" value="Register user" />
</form>
</body>
</html> | SAST | Unverified | False Positive |
/base/spring/spring-messaging/5.0.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/websocket-0.0.1-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY --from=builder /usr/src/target/websocket-0.0.1-SNAPSHOT.jar /websocket-0.0.1-SNAPSHOT.jar
CMD ["java", "-jar", "/websocket-0.0.1-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/spring/spring-rest-data/2.6.6/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-rest-data-demo-2.0.0.BUILD.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY --from=builder /usr/src/target/spring-rest-data-demo-2.0.0.BUILD.jar /spring-rest-data-demo-2.0.0.BUILD.jar
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-rest-data-demo-2.0.0.BUILD.jar"] | SAST | Unverified | True Positive |
/base/spring/spring-security-oauth2/2.0.8/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-security-oauth2-0.0.1-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY --from=builder /usr/src/target/demo-0.0.1-SNAPSHOT.jar /spring-security-oauth2-0.0.1-SNAPSHOT.jar
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-security-oauth2-0.0.1-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/spring/spring-security/5.6.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/demo.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["java", "-jar", "/demo.jar"] | SAST | Unverified | True Positive |
/base/spring/spring-security/5.6.3/code/src/main/java/com/vulhub/authzvuln/MyErrorController.java | ['CWE-352: Cross-Site Request Forgery (CSRF)'] | @RequestMapping("/error") | Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST'). | MEDIUM | public class MyErrorController implements ErrorController {
@RequestMapping("/error")
public String handleError(HttpServletRequest request) {
Object status = request.getAttribute(RequestDispatcher.ERROR_STATUS_CODE); | SAST | Unverified | True Positive |
/base/spring/with-h2database/1.4.197/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/h2-console-demo-0.0.1-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080 5005
CMD ["java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/h2-console-demo-0.0.1-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/spring/with-jackson/2.8.8/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/jackson.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["java", "-jar", "/jackson.jar"] | SAST | Unverified | True Positive |
/base/struts2/2.3.28/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mvn", "jetty:run"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["mvn", "jetty:run"] | SAST | Unverified | True Positive |
/base/struts2/2.3.30/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mvn", "jetty:run"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["mvn", "jetty:run"] | SAST | Unverified | True Positive |
/base/struts2/2.5.16/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mvn", "jetty:run"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["mvn", "jetty:run"] | SAST | Unverified | False Positive |
/base/struts2/2.5.25/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mvn", "jetty:run"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["mvn", "jetty:run"] | SAST | Unverified | True Positive |
/base/unomi/1.5.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["bin/karaf", "server"] | SAST | Unverified | False Positive |
/base/unomi/1.5.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["bin/karaf", "server"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["bin/karaf", "server"] | SAST | Unverified | True Positive |
/base/uwsgi/php/2.0.16/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/uwsgi", "/etc/uwsgi.ini"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["/uwsgi", "/etc/uwsgi.ini"] | SAST | Unverified | True Positive |
/base/webmin/1.850/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT /docker-entrypoint.sh | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && rm -rf /tmp/* /var/lib/apt/lists/*
ENTRYPOINT /docker-entrypoint.sh | SAST | Unverified | True Positive |
/base/webmin/1.910/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && echo 'root:vulhub' | chpasswd
ENTRYPOINT ["/docker-entrypoint.sh"] | SAST | Unverified | True Positive |
/base/xstream/1.4.15/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/xstream-sample.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["java", "-jar", "/xstream-sample.jar"] | SAST | Unverified | True Positive |
/base/xstream/1.4.16/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/xstream-sample-0.0.1-SNAPSHOT.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["java", "-jar", "/xstream-sample-0.0.1-SNAPSHOT.jar"] | SAST | Unverified | True Positive |
/base/xxl-job/2.2.0/admin/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["java", "-jar", "/usr/src/xxl-job-admin-2.2.0.jar"] | SAST | Unverified | True Positive |
/base/xxl-job/2.2.0/admin/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/usr/src/xxl-job-admin-2.2.0.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["java", "-jar", "/usr/src/xxl-job-admin-2.2.0.jar"] | SAST | Unverified | True Positive |
/base/xxl-job/2.2.0/executor/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["java", "-jar", "/usr/src/xxl-job-executor-sample-springboot-2.2.0.jar"] | SAST | Unverified | True Positive |
/base/xxl-job/2.2.0/executor/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/usr/src/xxl-job-executor-sample-springboot-2.2.0.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["java", "-jar", "/usr/src/xxl-job-executor-sample-springboot-2.2.0.jar"] | SAST | Unverified | True Positive |
/base/yapi/1.10.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["bash", "/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /docker-entrypoint.sh
WORKDIR /usr/src
ENTRYPOINT ["bash", "/docker-entrypoint.sh"]
CMD [ "npm", "start" ] | SAST | Unverified | True Positive |
/base/yapi/1.10.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "npm", "start" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src
ENTRYPOINT ["bash", "/docker-entrypoint.sh"]
CMD [ "npm", "start" ] | SAST | Unverified | True Positive |
Subsets and Splits