Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Code Security Report: 22 high severity findings, 937 total findings #67

Open
1 task
mend-for-github-com bot opened this issue Apr 19, 2023 · 0 comments
Open
1 task
Labels
Mend: code security findings Code security findings detected by Mend

Comments

@mend-for-github-com
Copy link

mend-for-github-com bot commented Apr 19, 2023

Code Security Report

Scan Metadata

Latest Scan: 2023-05-18 03:51am
Total Findings: 937 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 588
Detected Programming Languages: 3 (JavaScript / Node.js, Android Java, C/C++ (Beta))

  • Check this box to manually trigger a scan

Most Relevant Findings

The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the Mend SAST Application.

SeverityVulnerability TypeCWEFileData FlowsDate
HighExternal Data In SQL Queries

CWE-89

Insecure_Data_Storage2.java:54

12023-04-19 06:32pm
More info

}
public void createDatabase() {
try {
passwordDB = this.openOrCreateDatabase("passwordDB", MODE_PRIVATE, null);
passwordDB.execSQL("CREATE TABLE IF NOT EXISTS passwordDB " +

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

Insecure_Data_Storage2.java:89

12023-04-19 06:32pm
More info

public void createDatabase() {
try {
String path = DB_PATH + DB_NAME;
passwordDB = this.openOrCreateDatabase(path, MODE_PRIVATE, null);
passwordDB.execSQL("CREATE TABLE IF NOT EXISTS passwordDB " +

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

SecretProvider.java:186

12023-04-19 06:32pm
More info

}
// Recreates the table when the database needs to be upgraded
@Override
public void onUpgrade(SQLiteDatabase sqlDB, int oldVersion, int newVersion) {
sqlDB.execSQL("DROP TABLE IF EXISTS " + TABLE_NAME);

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

mProvider.java:186

12023-04-19 06:32pm
More info

}
// Recreates the table when the database needs to be upgraded
@Override
public void onUpgrade(SQLiteDatabase sqlDB, int oldVersion, int newVersion) {
sqlDB.execSQL("DROP TABLE IF EXISTS " + TABLE_NAME);

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

SessionProvider.java:226

12023-04-19 06:32pm
More info

onCreate(sqlDB);
}
public void deleteData(){
SQLiteDatabase sqlDB = getWritableDatabase();
sqlDB.execSQL("DELETE FROM " + TABLE_NAME);

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

SessionProvider.java:220

12023-04-19 06:32pm
More info

}
// Recreates the table when the database needs to be upgraded
@Override
public void onUpgrade(SQLiteDatabase sqlDB, int oldVersion, int newVersion) {
sqlDB.execSQL("DROP TABLE IF EXISTS " + TABLE_NAME);

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

Insecure_Data_Storage.java:52

12023-04-19 06:32pm
More info

}
public void createDatabase() {
try {
Members = this.openOrCreateDatabase("Members", MODE_PRIVATE, null);
Members.execSQL("CREATE TABLE IF NOT EXISTS Members " +

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

Insecure_Data_Storage.java:83

12023-04-19 06:32pm
More info

public void createDatabase() {
try {
String path = DB_PATH + DB_NAME;
Members = this.openOrCreateDatabase(path, MODE_PRIVATE, null);
Members.execSQL("CREATE TABLE IF NOT EXISTS Members " +

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

SessionProvider.java:85

12023-04-19 06:32pm
More info

}
@Override
public Cursor query(Uri uri, String[] projection, String selection, String[] selectionArgs, String sortOrder) {
// Used to create a SQL query
SQLiteQueryBuilder queryBuilder = new SQLiteQueryBuilder();

1 Data Flow/s detected
View Data Flow 1

HighExternal Data In SQL Queries

CWE-89

SecretProvider.java:62

12023-04-19 06:32pm
More info

}
@Override
public Cursor query(Uri uri, String[] projection, String selection, String[] selectionArgs, String sortOrder) {
// Used to create a SQL query
SQLiteQueryBuilder queryBuilder = new SQLiteQueryBuilder();

1 Data Flow/s detected
View Data Flow 1

Findings Overview

Severity Vulnerability Type CWE Language Count
High External Data In SQL Queries CWE-89 Android Java 15
High DOM Based Cross-Site Scripting CWE-79 JavaScript / Node.js 3
High Arbitrary Code Injection CWE-94 Android Java 4
Medium Miscellaneous Dangerous Functions CWE-676 Android Java 409
Medium Log Messages CWE-209 Android Java 64
Medium Heap Inspection CWE-244 Android Java 145
Medium Hardcoded Password/Credentials CWE-798 Android Java 11
Medium Location Information CWE-200 Android Java 2
Medium Intents Usage CWE-926 Android Java 102
Medium Shared Preferences Usage CWE-200 Android Java 3
Medium Insecure Data Storage CWE-200 Android Java 8
Medium Insufficient Transport Layer Protection CWE-319 Android Java 106
Low External URL Access Android Java 16
Low Log Forging CWE-117 JavaScript / Node.js 2
Low Weak Encryption Strength CWE-326 Android Java 23
Low Application Configuration CWE-16 Android Java 24
@mend-for-github-com mend-for-github-com bot added the Mend: code security findings Code security findings detected by Mend label Apr 19, 2023
@mend-for-github-com mend-for-github-com bot changed the title Code Security Report: 22 high severity findings, 953 total findings Code Security Report: 22 high severity findings, 937 total findings May 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: code security findings Code security findings detected by Mend
Projects
None yet
Development

No branches or pull requests

0 participants