Improper Restriction of Excessive Authentication Attempts

Property
Languagecsharp
Severitymedium
CWECWE-307: Improper Restriction of Excessive Authentication Attempts
OWASPA07:2021 - Identification and Authentication Failures
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description

The account lockout feature is disabled or not properly configured in your authentication logic, allowing unlimited failed login attempts. This makes it easy for attackers to repeatedly guess passwords without being blocked.

Impact

If exploited, attackers can use automated tools to perform brute-force attacks and potentially compromise user accounts. This can lead to unauthorized access, data breaches, and reputational damage to your application or organization.

Improper Restriction of Recursive Entity References in DTDs (‘XML Entity Expansion’)

Property
Languagepython
Severitylow
CWECWE-776: Improper Restriction of Recursive Entity References in DTDs (‘XML Entity Expansion’)
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelLow
Impact LevelMedium
Likelihood LevelLow

Description

Using Python’s built-in xmlrpc libraries can expose your application to XML-related security vulnerabilities because they do not properly handle malicious or malformed XML input. It’s safer to use hardened libraries like defusedxml to process XML data.

Improper Restriction of Rendered UI Layers or Frames

Property
Languageruby
Severitylow
CWECWE-1021: Improper Restriction of Rendered UI Layers or Frames
OWASPA04:2021 - Insecure Design
Confidence LevelLow
Impact LevelMedium
Likelihood LevelLow

Description

Using dynamic ‘:action’ routes in Ruby on Rails can allow users to trigger arbitrary controller actions by crafting specific URLs. This weakens route restrictions and can expose unintended functionality.

Impact

If exploited, an attacker could access and execute any public controller action, potentially exposing sensitive data or enabling unauthorized operations. This increases the risk of information leakage, privilege escalation, or unintended application behavior.

Improper Restriction of XML External Entity Reference

Property
Languageclojure
Severityhigh
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelHigh
Impact LevelHigh
Likelihood LevelLow

Description

The code allows XML parsers to process external entity references or DOCTYPE declarations without disabling them. This makes it possible for attackers to inject malicious XML that the application will process, leading to security risks.

Impact

If exploited, attackers could read sensitive files, access internal network resources, or trigger denial of service by supplying crafted XML input. This could result in data breaches or compromise of the application and its environment.

Improper Restriction of XML External Entity Reference

Property
Languagecsharp
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelLow

Description

The code enables parsing of XML input with DTD processing and allows an external XmlResolver, which can be dangerous if the XML data comes from user input. This configuration makes the application vulnerable to XML External Entity (XXE) attacks.

Improper Restriction of XML External Entity Reference

Property
Languagecsharp
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelLow

Description

The code enables DTD parsing in XmlReaderSettings and then parses XML input received from a public method’s string parameter. This allows user-supplied XML to include external entities, which is unsafe.

Impact

If exploited, an attacker could read sensitive files from the server, make network requests, or cause denial of service by submitting malicious XML. This may lead to data leakage, unauthorized access, or disruption of the application.

Improper Restriction of XML External Entity Reference

Property
Languagecsharp
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelLow

Description

The code creates an XmlTextReader that processes XML input from a public method without disabling DTD processing. This allows external entities in the XML to be resolved, which can be dangerous if the input is user-controlled.

Impact

If exploited, an attacker could use specially crafted XML to read sensitive files from the server, perform server-side request forgery (SSRF), or cause denial of service. This can lead to data leakage, unauthorized access, or system compromise.

Improper Restriction of XML External Entity Reference

Property
Languagego
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description

The code enables XML external entity (XXE) processing by setting the XMLParseNoEnt flag when parsing XML with libxml2. This allows external entities in user-supplied XML, which can expose sensitive files or systems to attackers.

Impact

If exploited, an attacker could read confidential files from the server, perform server-side request forgery (SSRF), or cause denial of service. This can lead to data breaches, exposure of internal systems, or disruption of application availability.

Improper Restriction of XML External Entity Reference

Property
Languagescala
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelHigh
Impact LevelMedium
Likelihood LevelLow

Description

The code creates an XML DocumentBuilder without disabling entity processing features. This leaves the application vulnerable to attackers crafting malicious XML that the parser will process insecurely.

Impact

If exploited, attackers could read sensitive files, perform denial of service attacks, or make server-side network requests (SSRF) through malicious XML. This can lead to data leaks, system downtime, or unauthorized access to internal resources.