Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[CIN-1052] implementing nightly job for OpenApi tests #801

Merged
merged 12 commits into from
Jan 15, 2025

Conversation

azakrzewski-hy
Copy link
Collaborator

https://hyland.atlassian.net/browse/CIN-1052

Adding implementation for nightly job run with OpenApi Specification tests

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: cbb95582-79b6-4df1-818b-4e6a30f1c8a7
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[14 Jan 2025 13:32:18,0027] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: cc8ee5fc-63ed-4d07-b077-855325b99f04
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[14 Jan 2025 13:51:20,0381] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: 20a0470c-7b2a-471d-a208-02000e411f23
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[14 Jan 2025 15:32:19,0418] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: 17f4c9d0-7a40-41bf-b0ce-387a7a7336a8
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[14 Jan 2025 15:48:57,0808] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: 0e8848fd-6f00-44af-967b-eaba33e228a9
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[14 Jan 2025 16:08:00,0552] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: 7b493785-7ff7-49eb-abb1-efb4cea9123b
SCAN_STATUS: PENDING

Copy link
Member

@tpage-alfresco tpage-alfresco left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - thanks for the quick turnaround on this Adam!

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: e7ed6248-50c0-43f4-9098-c83cd6382999
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[15 Jan 2025 09:15:59,0550] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: b2d7e92b-50df-4fdc-9745-c55330732146
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[15 Jan 2025 09:47:43,0317] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: 532a8027-3452-4c8a-89b6-90d27e5e14b6
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[15 Jan 2025 10:15:02,0932] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

Copy link



Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: f0c98efe-5516-4ae3-b5eb-44d1f0746278
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================

==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip

==================
Analyzed 2 issues.
==================

details


--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP Supported Cleansers
https://downloads.veracode.com/securityscan/cwe/v4/java/80.html
----------------------------------
Found 1 issues of Medium severity.
----------------------------------
CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): org/springframework/security/spring-security-webauthn.js:199
Details: This call to href() contains a URL redirection to untrusted site flaw. Writing untrusted input into a URL value could cause the web application to redirect the request to the specified URL, leading to phishing attempts to steal user credentials. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. References: CWE OWASP
https://downloads.veracode.com/securityscan/cwe/v4/java/601.html

Total flaws found: 2, New flaws found: 2 as compared to baseline


========================
FAILURE: Found 2 issues!
========================

[15 Jan 2025 10:27:32,0634] PIPELINE-SCAN INFO: Writing Scan Summary to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.

@azakrzewski-hy azakrzewski-hy merged commit 56be662 into master Jan 15, 2025
39 checks passed
@azakrzewski-hy azakrzewski-hy deleted the feature/CIN-1052/nightly-job-for-openapi-tests branch January 15, 2025 12:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants