Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CSRF @ /MembersRecord.cs #99

Open
apcxtest opened this issue Jan 11, 2024 · 0 comments
Open

CSRF @ /MembersRecord.cs #99

apcxtest opened this issue Jan 11, 2024 · 0 comments

Comments

@apcxtest
Copy link
Contributor

apcxtest commented Jan 11, 2024

Checkmarx (SAST): CSRF
Security Issue: Read More about CSRF
Applications: ilidioc_App, Microsserviços Produtivos, test_App
Checkmarx Project: apcxtestorg/testrepo
Repository URL: https://github.com/apcxtestorg/testrepo
Branch: main
Scan ID: a078e21a-b6dc-4705-a0cf-3262f0044fe1


Method Members_delete_Click at line 392 of /MembersRecord.cs gets a parameter from a user request from Value. This parameter value flows through the code and is eventually used to access application state altering functionality. This may enable Cross-Site Request Forgery (CSRF).

Result #1:
Severity: MEDIUM
State: TO_VERIFY
Status: RECURRENT
Attack Vector:

    1. Value: /MembersRecord.cs[392,64]
    2. ToSQL: /MembersRecord.cs[392,38]
    3. sWhere: /MembersRecord.cs[392,3]
    4. sWhere: /MembersRecord.cs[395,47]
    5. sSQL: /MembersRecord.cs[395,9]
    6. sSQL: /MembersRecord.cs[400,38]
    7. OleDbCommand: /MembersRecord.cs[400,21]
    8. cmd: /MembersRecord.cs[400,15]
    9. cmd: /MembersRecord.cs[402,3]
    10. ExecuteNonQuery: /MembersRecord.cs[402,7]
    Review result in Checkmarx One: CSRF

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant