path
stringlengths
7
151
cwe
stringclasses
371 values
vuln
stringlengths
5
197k
vuln_desc
stringlengths
4
7.39k
severity
stringclasses
5 values
code
stringlengths
0
487k
scanner
stringclasses
7 values
status
stringclasses
3 values
gpt_status
stringclasses
4 values
/base/pgadmin/7.6/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "pgadmin4" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/local/lib/python3.10/site-packages/pgadmin4 CMD [ "pgadmin4" ]
SAST
Unverified
True Positive
/base/php/5.3-apache/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["docker-php-entrypoint"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 80 ENTRYPOINT ["docker-php-entrypoint"] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/php/5.3-apache/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["apache2-foreground"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["docker-php-entrypoint"] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/php/5.4.1/apache/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["docker-php-entrypoint"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 80 ENTRYPOINT ["docker-php-entrypoint"] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/php/5.4.1/apache/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["apache2-foreground"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["docker-php-entrypoint"] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/php/5.4.1/cgi/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["apache2-foreground"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 80 CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/php/5.4.1/cli/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["docker-php-entrypoint"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-php-* /usr/local/bin/ ENTRYPOINT ["docker-php-entrypoint"] CMD ["php", "-a"]
SAST
Unverified
True Positive
/base/php/5.4.1/cli/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["php", "-a"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["docker-php-entrypoint"] CMD ["php", "-a"]
SAST
Unverified
True Positive
/base/php/8.1-backdoor/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /var/www/html CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"]
SAST
Unverified
True Positive
/base/php/xxe/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /var/www/html CMD ["php", "-S", "0.0.0.0:80", "-t", "/var/www/html"]
SAST
Unverified
True Positive
/base/polkit/0.105/Dockerfile
['CWE-269: Improper Privilege Management']
CMD qemu-system-x86_64 \ -drive "file=ubuntu-20.04-server-cloudimg-amd64.img,format=qcow2" \ -drive "file=user-data.img,format=raw" \ -m 2G \ -nic user,model=virtio,hostfwd=tcp:0.0.0.0:2222-:22 \ -smp $(nproc) \ -nographic \ -monitor null
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 2222 CMD qemu-system-x86_64 \ -drive "file=ubuntu-20.04-server-cloudimg-amd64.img,format=qcow2" \ -drive "file=user-data.img,format=raw" \ -m 2G \ -nic user,model=virtio,hostfwd=tcp:0.0.0.0:2222-:22 \ -smp $(nproc) \ -nographic \ -monitor null
SAST
Unverified
True Positive
/base/postgres/9.6.7/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh /usr/local/bin/ RUN ln -s usr/local/bin/docker-entrypoint.sh / # backwards compat ENTRYPOINT ["docker-entrypoint.sh"] EXPOSE 5432 CMD ["postgres"]
SAST
Unverified
False Positive
/base/postgres/9.6.7/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["postgres"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 5432 CMD ["postgres"]
SAST
Unverified
True Positive
/base/rails/5.0.7/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& bundle install CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"]
SAST
Unverified
True Positive
/base/rails/5.2.2/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& bundle install CMD ["rails", "server", "-b", "0.0.0.0", "-p", "3000"]
SAST
Unverified
True Positive
/base/redis/5.0.7/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["redis-server", "/etc/redis/redis.conf"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& sed -i 's|logfile .*|logfile /dev/stdout|g' /etc/redis/redis.conf CMD ["redis-server", "/etc/redis/redis.conf"]
SAST
Unverified
True Positive
/base/rocketmq/5.1.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9876 10911 5005 8080 8081 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["mqbroker", "-n", "localhost:9876", "--enable-proxy"]
SAST
Unverified
True Positive
/base/rocketmq/5.1.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mqbroker", "-n", "localhost:9876", "--enable-proxy"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["mqbroker", "-n", "localhost:9876", "--enable-proxy"]
SAST
Unverified
True Positive
/base/saltstack/2019.2.3/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/usr/bin/dumb-init"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY saltinit.py /usr/local/bin/saltinit ENTRYPOINT ["/usr/bin/dumb-init"] CMD ["/usr/local/bin/saltinit"] EXPOSE 22 4505 4506 8000
SAST
Unverified
True Positive
/base/saltstack/2019.2.3/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/usr/local/bin/saltinit"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY saltinit.py /usr/local/bin/saltinit ENTRYPOINT ["/usr/bin/dumb-init"] CMD ["/usr/local/bin/saltinit"] EXPOSE 22 4505 4506 8000 RUN salt-run salt.cmd tls.create_self_signed_cert
SAST
Unverified
True Positive
/base/saltstack/3002/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/usr/bin/dumb-init"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY saltinit.py /usr/local/bin/saltinit ENTRYPOINT ["/usr/bin/dumb-init"] CMD ["/usr/local/bin/saltinit"] EXPOSE 22 4505 4506 8000
SAST
Unverified
True Positive
/base/saltstack/3002/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/usr/local/bin/saltinit"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY saltinit.py /usr/local/bin/saltinit ENTRYPOINT ["/usr/bin/dumb-init"] CMD ["/usr/local/bin/saltinit"] EXPOSE 22 4505 4506 8000 RUN salt-run salt.cmd tls.create_self_signed_cert
SAST
Unverified
True Positive
/base/scrapyd/1.2.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["scrapyd", "-u", "nobody", "-g", "nogroup"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 6800 CMD ["scrapyd", "-u", "nobody", "-g", "nogroup"]
SAST
Unverified
False Positive
/base/shiro/1.0.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/shiro/1.0.0/code/src/main/java/org/vulhub/shirodemo/UserController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/admin")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
} @RequestMapping("/admin") public String helloPage() { return "admin"; }
SAST
Unverified
True Positive
/base/shiro/1.0.0/code/src/main/java/org/vulhub/shirodemo/UserController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/unauth")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
} @RequestMapping("/unauth") public String errorPage() { return "error"; }
SAST
Unverified
False Positive
/base/shiro/1.0.0/code/src/main/java/org/vulhub/shirodemo/UserController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/login")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
} @RequestMapping("/login") public String loginPage() { return "login"; }
SAST
Unverified
False Positive
/base/shiro/1.0.0/code/src/main/resources/templates/login.html
['CWE-352: Cross-Site Request Forgery (CSRF)']
<form class="form-signin" action="/doLogin" method="post"> <h1 class="h3 mb-3 font-weight-normal">Please sign in</h1> <label class="sr-only">Username</label> <input type="text" class="form-control" placeholder="Username" name="username" required> <label class="sr-only">Password</label> <input type="password" class="form-control" placeholder="Password" name="password" required> <div class="checkbox mb-3"> <label> <input type="checkbox" name="rememberme" value="remember-me"> Remember me </label> </div> <button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button> </form>
Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks.
MEDIUM
</head> <body class="text-center"> <form class="form-signin" action="/doLogin" method="post"> <h1 class="h3 mb-3 font-weight-normal">Please sign in</h1> <label class="sr-only">Username</label> <input type="text" class="form-control" placeholder="Username" name="username" required> <label class="sr-only">Password</label> <input type="password" class="form-control" placeholder="Password" name="password" required> <div class="checkbox mb-3"> <label> <input type="checkbox" name="rememberme" value="remember-me"> Remember me </label> </div> <button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button> </form> </body> </html>
SAST
Unverified
False Positive
/base/shiro/1.2.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/shiro/1.2.4/code/src/main/java/org/vulhub/shirodemo/UserController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
} @RequestMapping("/") public String helloPage() { return "hello"; }
SAST
Unverified
False Positive
/base/shiro/1.2.4/code/src/main/java/org/vulhub/shirodemo/UserController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/unauth")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
} @RequestMapping("/unauth") public String errorPage() { return "error"; }
SAST
Unverified
False Positive
/base/shiro/1.2.4/code/src/main/java/org/vulhub/shirodemo/UserController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/login")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
} @RequestMapping("/login") public String loginPage() { return "login"; }
SAST
Unverified
True Positive
/base/shiro/1.2.4/code/src/main/resources/templates/login.html
['CWE-352: Cross-Site Request Forgery (CSRF)']
<form class="form-signin" action="/doLogin" method="post"> <h1 class="h3 mb-3 font-weight-normal">Please sign in</h1> <label class="sr-only">Username</label> <input type="text" class="form-control" placeholder="Username" name="username" required> <label class="sr-only">Password</label> <input type="password" class="form-control" placeholder="Password" name="password" required> <div class="checkbox mb-3"> <label> <input type="checkbox" name="rememberme" value="remember-me"> Remember me </label> </div> <button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button> </form>
Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks.
MEDIUM
</head> <body class="text-center"> <form class="form-signin" action="/doLogin" method="post"> <h1 class="h3 mb-3 font-weight-normal">Please sign in</h1> <label class="sr-only">Username</label> <input type="text" class="form-control" placeholder="Username" name="username" required> <label class="sr-only">Password</label> <input type="password" class="form-control" placeholder="Password" name="password" required> <div class="checkbox mb-3"> <label> <input type="checkbox" name="rememberme" value="remember-me"> Remember me </label> </div> <button class="btn btn-lg btn-primary btn-block" type="submit">Sign in</button> </form> </body> </html>
SAST
Unverified
True Positive
/base/shiro/1.5.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["java", "-jar", "/shirodemo-1.0-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/AccountInfoController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/admin/")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
public class AccountInfoController { @RequestMapping("/admin/") public String home(Model model) { String name = "World";
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/HelloController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
@SuppressWarnings("Duplicates") @RequestMapping("/") public String home(HttpServletRequest request, Model model) { String name = "World";
SAST
Unverified
False Positive
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/LoginController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/login.html")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
public class LoginController { @RequestMapping("/login.html") public String loginTemplate() { return "login";
SAST
Unverified
False Positive
/base/shiro/1.5.1/code/src/main/java/org/apache/shiro/samples/RestrictedErrorController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping(ERROR_PATH)
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
} @RequestMapping(ERROR_PATH) String error(HttpServletRequest request, Model model) { Map<String, Object> errorMap = errorAttributes.getErrorAttributes(new ServletWebRequest(request), false); model.addAttribute("errors", errorMap);
SAST
Unverified
False Positive
/base/shiro/1.5.1/code/src/main/resources/templates/account-info.html
['CWE-352: Cross-Site Request Forgery (CSRF)']
<form id="logoutForm" th:action="@{/logout}" method="post"> <input type="submit" class="btn btn-danger" value="Logout"/> </form>
Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks.
MEDIUM
<a th:href="@{/}" class="btn btn-primary">Home</a> <form id="logoutForm" th:action="@{/logout}" method="post"> <input type="submit" class="btn btn-danger" value="Logout"/> </form> </div> <script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
SAST
Unverified
False Positive
/base/shiro/1.5.1/code/src/main/resources/templates/account-info.html
['CWE-353: Missing Support for Integrity Check']
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
</div> <script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> </body> </html>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/account-info.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
</div> <script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> </body> </html>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html
['CWE-353: Missing Support for Integrity Check']
<link href="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css" rel="stylesheet" type="text/css"/>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<meta name="viewport" content="width=device-width"/> <link href="https://fonts.googleapis.com/css?family=Open+Sans:300italic,300,400italic,400,600italic,600,700italic,700,800italic,800" rel="stylesheet" type="text/css"/> <link href="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css" rel="stylesheet" type="text/css"/> <style> body {
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.2/html5shiv.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<!--[if lt IE 9]> <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.2/html5shiv.js"></script> <script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script> <![endif]--> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<!--[if lt IE 9]> <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.2/html5shiv.js"></script> <script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script> <![endif]--> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script> <![endif]--> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> </head> <body>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/fragments/head.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<![endif]--> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> </head> <body> <p>Nothing to see here, move along.</p>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/hello.html
['CWE-352: Cross-Site Request Forgery (CSRF)']
<form id="logoutForm" th:action="@{/logout}" method="post"> <input type="submit" class="btn btn-danger" value="Logout"/> </form>
Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks.
MEDIUM
<div th:if="${subject.authenticated}"> <h4 th:text="'Principal: ' + ${subject.principal}"></h4> <form id="logoutForm" th:action="@{/logout}" method="post"> <input type="submit" class="btn btn-danger" value="Logout"/> </form> </div> <h4><a th:href="@{/admin/}" class="btn btn-primary">Account info</a>&nbsp;(Requires authenticated.)</h4>
SAST
Unverified
False Positive
/base/shiro/1.5.1/code/src/main/resources/templates/hello.html
['CWE-353: Missing Support for Integrity Check']
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
</div> <script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> </body> </html>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/hello.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
</div> <script src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <script src="https://netdna.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js"></script> </body> </html>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/login.html
['CWE-352: Cross-Site Request Forgery (CSRF)']
<form name="loginform" action="" method="POST" accept-charset="UTF-8" role="form"> <fieldset> <div class="form-group"> <input class="form-control" placeholder="Username or Email" name="username" type="text"/> </div> <div class="form-group"> <input class="form-control" placeholder="Password" name="password" type="password" value=""/> </div> <input class="btn btn-lg btn-success btn-block" type="submit" value="Login"/> </fieldset> </form>
Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks.
MEDIUM
</div> <div class="panel-body"> <form name="loginform" action="" method="POST" accept-charset="UTF-8" role="form"> <fieldset> <div class="form-group"> <input class="form-control" placeholder="Username or Email" name="username" type="text"/> </div> <div class="form-group"> <input class="form-control" placeholder="Password" name="password" type="password" value=""/> </div> <input class="btn btn-lg btn-success btn-block" type="submit" value="Login"/> </fieldset> </form> </div> </div> </div>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/login.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://code.jquery.com/jquery.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<!-- jQuery (necessary for Bootstrap's JavaScript plugins) --> <script src="https://code.jquery.com/jquery.js"></script> <script src="//netdna.bootstrapcdn.com/bootstrap/3.0.2/js/bootstrap.min.js"></script> <!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/login.html
['CWE-353: Missing Support for Integrity Check']
<script src="//netdna.bootstrapcdn.com/bootstrap/3.0.2/js/bootstrap.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<!-- jQuery (necessary for Bootstrap's JavaScript plugins) --> <script src="https://code.jquery.com/jquery.js"></script> <script src="//netdna.bootstrapcdn.com/bootstrap/3.0.2/js/bootstrap.min.js"></script> <!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/login.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script> <script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script> <![endif]--> </body>
SAST
Unverified
True Positive
/base/shiro/1.5.1/code/src/main/resources/templates/login.html
['CWE-353: Missing Support for Integrity Check']
<script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script>
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<!--[if lt IE 9]> <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script> <script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script> <![endif]--> </body> </html>
SAST
Unverified
True Positive
/base/skywalking/8.3.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD bin/web-server.sh
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR ${BASEDIR} CMD bin/web-server.sh
SAST
Unverified
True Positive
/base/solr/7.0.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV PATH="$PATH:/opt/solr/bin" WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/7.0.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.1.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV PATH="$PATH:/opt/solr/bin" WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.1.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.11.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV PATH="$PATH:/opt/solr/bin" WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.11.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.2.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV PATH="$PATH:/opt/solr/bin" WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.2.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.3.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV PATH="$PATH:/opt/solr/bin" WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.3.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.6.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV PATH="$PATH:/opt/solr/bin" WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.6.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-cloud", "-s", "/opt/solr/example/cloud", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.8.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV PATH="$PATH:/opt/solr/bin" WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/solr/8.8.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/solr ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["solr", "-f", "-force", "-p", "8983", "-a", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"]
SAST
Unverified
True Positive
/base/spark/2.3.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh /docker-entrypoint.sh ENTRYPOINT [ "/docker-entrypoint.sh" ] CMD [ "master" ]
SAST
Unverified
True Positive
/base/spark/2.3.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "master" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT [ "/docker-entrypoint.sh" ] CMD [ "master" ]
SAST
Unverified
True Positive
/base/spring/spring-cloud-function/3.2.2/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-cloud-function-sample-0.0.1-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY --from=builder /usr/src/target/spring-cloud-function-sample-0.0.1-SNAPSHOT.jar /spring-cloud-function-sample-0.0.1-SNAPSHOT.jar CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-cloud-function-sample-0.0.1-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/spring/spring-cloud-gateway/3.1.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/spring-cloud-gateway-0.0.1-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY --from=builder /usr/src/target/spring-cloud-gateway-0.0.1-SNAPSHOT.jar /spring-cloud-gateway-0.0.1-SNAPSHOT.jar CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/spring-cloud-gateway-0.0.1-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/spring/spring-data-commons/2.0.5/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-data-web-example-2.0.0.RELEASE.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY --from=builder /usr/src/target/spring-data-web-example-2.0.0.RELEASE.jar /spring-data-web-example-2.0.0.RELEASE.jar CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-data-web-example-2.0.0.RELEASE.jar"]
SAST
Unverified
True Positive
/base/spring/spring-data-commons/2.0.5/src/main/resources/templates/users.html
['CWE-353: Missing Support for Integrity Check']
<link rel="stylesheet" href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.2/css/bootstrap.min.css" />
This tag is missing an 'integrity' subresource integrity attribute. The 'integrity' attribute allows for the browser to verify that externally hosted files (for example from a CDN) are delivered without unexpected manipulation. Without this attribute, if an attacker can modify the externally hosted resource, this could lead to XSS and other types of attacks. To prevent this, include the base64-encoded cryptographic hash of the resource (file) you’re telling the browser to fetch in the 'integrity' attribute for all externally hosted files.
MEDIUM
<title>Users</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8" /> <link rel="stylesheet" href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.2/css/bootstrap.min.css" /> <link rel="stylesheet" th:href="@{/css/style.css}" type="text/css" /> </head> <body>
SAST
Unverified
True Positive
/base/spring/spring-data-commons/2.0.5/src/main/resources/templates/users.html
['CWE-352: Cross-Site Request Forgery (CSRF)']
<form method="post" role="form" class="gb-form" id="form" th:action="@{/users(page=${page},size=${users.size})}" th:object="${userForm}"> <ul th:if="${#fields.hasErrors('*')}" class="errors" > <li th:each="error : ${#fields.errors('*')}" th:text="${error}" class="text-danger">Input is incorrect</li> </ul> <div class="form-group"> <label for="username">Username</label><br /> <input type="text" th:field="*{username}" class="form-control" th:errorclass="fieldError" required="required" /> </div> <div class="form-group"> <label for="password">Password</label><br /> <input type="password" th:field="*{password}" class="form-control" th:errorclass="fieldError" required="required" /> </div> <div class="form-group"> <label for="repeatedPassword">Password (repeated)</label><br /> <input type="password" th:field="*{repeatedPassword}" class="form-control" th:errorclass="fieldError" required="required" /> </div> <input type="submit" class="btn btn-default" value="Register user" /> </form>
Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks.
MEDIUM
</ol> <form method="post" role="form" class="gb-form" id="form" th:action="@{/users(page=${page},size=${users.size})}" th:object="${userForm}"> <ul th:if="${#fields.hasErrors('*')}" class="errors" > <li th:each="error : ${#fields.errors('*')}" th:text="${error}" class="text-danger">Input is incorrect</li> </ul> <div class="form-group"> <label for="username">Username</label><br /> <input type="text" th:field="*{username}" class="form-control" th:errorclass="fieldError" required="required" /> </div> <div class="form-group"> <label for="password">Password</label><br /> <input type="password" th:field="*{password}" class="form-control" th:errorclass="fieldError" required="required" /> </div> <div class="form-group"> <label for="repeatedPassword">Password (repeated)</label><br /> <input type="password" th:field="*{repeatedPassword}" class="form-control" th:errorclass="fieldError" required="required" /> </div> <input type="submit" class="btn btn-default" value="Register user" /> </form> </body> </html>
SAST
Unverified
False Positive
/base/spring/spring-messaging/5.0.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/websocket-0.0.1-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY --from=builder /usr/src/target/websocket-0.0.1-SNAPSHOT.jar /websocket-0.0.1-SNAPSHOT.jar CMD ["java", "-jar", "/websocket-0.0.1-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/spring/spring-rest-data/2.6.6/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-rest-data-demo-2.0.0.BUILD.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY --from=builder /usr/src/target/spring-rest-data-demo-2.0.0.BUILD.jar /spring-rest-data-demo-2.0.0.BUILD.jar CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-rest-data-demo-2.0.0.BUILD.jar"]
SAST
Unverified
True Positive
/base/spring/spring-security-oauth2/2.0.8/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-security-oauth2-0.0.1-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY --from=builder /usr/src/target/demo-0.0.1-SNAPSHOT.jar /spring-security-oauth2-0.0.1-SNAPSHOT.jar CMD ["java", "-Djava.security.egd=file:/dev/./urandom", "-jar", "/spring-security-oauth2-0.0.1-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/spring/spring-security/5.6.3/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/demo.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["java", "-jar", "/demo.jar"]
SAST
Unverified
True Positive
/base/spring/spring-security/5.6.3/code/src/main/java/com/vulhub/authzvuln/MyErrorController.java
['CWE-352: Cross-Site Request Forgery (CSRF)']
@RequestMapping("/error")
Detected a method annotated with 'RequestMapping' that does not specify the HTTP method. CSRF protections are not enabled for GET, HEAD, TRACE, or OPTIONS, and by default all HTTP methods are allowed when the HTTP method is not explicitly specified. This means that a method that performs state changes could be vulnerable to CSRF attacks. To mitigate, add the 'method' field and specify the HTTP method (such as 'RequestMethod.POST').
MEDIUM
public class MyErrorController implements ErrorController { @RequestMapping("/error") public String handleError(HttpServletRequest request) { Object status = request.getAttribute(RequestDispatcher.ERROR_STATUS_CODE);
SAST
Unverified
True Positive
/base/spring/with-h2database/1.4.197/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/h2-console-demo-0.0.1-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 5005 CMD ["java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "/h2-console-demo-0.0.1-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/spring/with-jackson/2.8.8/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/jackson.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["java", "-jar", "/jackson.jar"]
SAST
Unverified
True Positive
/base/struts2/2.3.28/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mvn", "jetty:run"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["mvn", "jetty:run"]
SAST
Unverified
True Positive
/base/struts2/2.3.30/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mvn", "jetty:run"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["mvn", "jetty:run"]
SAST
Unverified
True Positive
/base/struts2/2.5.16/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mvn", "jetty:run"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["mvn", "jetty:run"]
SAST
Unverified
False Positive
/base/struts2/2.5.25/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mvn", "jetty:run"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["mvn", "jetty:run"]
SAST
Unverified
True Positive
/base/unomi/1.5.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh / ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["bin/karaf", "server"]
SAST
Unverified
False Positive
/base/unomi/1.5.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["bin/karaf", "server"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["bin/karaf", "server"]
SAST
Unverified
True Positive
/base/uwsgi/php/2.0.16/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/uwsgi", "/etc/uwsgi.ini"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["/uwsgi", "/etc/uwsgi.ini"]
SAST
Unverified
True Positive
/base/webmin/1.850/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT /docker-entrypoint.sh
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& rm -rf /tmp/* /var/lib/apt/lists/* ENTRYPOINT /docker-entrypoint.sh
SAST
Unverified
True Positive
/base/webmin/1.910/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& echo 'root:vulhub' | chpasswd ENTRYPOINT ["/docker-entrypoint.sh"]
SAST
Unverified
True Positive
/base/xstream/1.4.15/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/xstream-sample.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["java", "-jar", "/xstream-sample.jar"]
SAST
Unverified
True Positive
/base/xstream/1.4.16/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/xstream-sample-0.0.1-SNAPSHOT.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["java", "-jar", "/xstream-sample-0.0.1-SNAPSHOT.jar"]
SAST
Unverified
True Positive
/base/xxl-job/2.2.0/admin/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["java", "-jar", "/usr/src/xxl-job-admin-2.2.0.jar"]
SAST
Unverified
True Positive
/base/xxl-job/2.2.0/admin/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/usr/src/xxl-job-admin-2.2.0.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["java", "-jar", "/usr/src/xxl-job-admin-2.2.0.jar"]
SAST
Unverified
True Positive
/base/xxl-job/2.2.0/executor/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["java", "-jar", "/usr/src/xxl-job-executor-sample-springboot-2.2.0.jar"]
SAST
Unverified
True Positive
/base/xxl-job/2.2.0/executor/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/usr/src/xxl-job-executor-sample-springboot-2.2.0.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["java", "-jar", "/usr/src/xxl-job-executor-sample-springboot-2.2.0.jar"]
SAST
Unverified
True Positive
/base/yapi/1.10.2/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["bash", "/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh /docker-entrypoint.sh WORKDIR /usr/src ENTRYPOINT ["bash", "/docker-entrypoint.sh"] CMD [ "npm", "start" ]
SAST
Unverified
True Positive
/base/yapi/1.10.2/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "npm", "start" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src ENTRYPOINT ["bash", "/docker-entrypoint.sh"] CMD [ "npm", "start" ]
SAST
Unverified
True Positive