Improper Certificate Validation

Property
Languageruby
Severityhigh
CWECWE-295: Improper Certificate Validation
OWASPA03:2017 - Sensitive Data Exposure
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelHigh

Description

The code disables SSL certificate verification by using ‘OpenSSL::SSL::VERIFY_NONE’, which allows connections to untrusted or malicious servers. This means encrypted connections are not properly validated and can be easily intercepted.

Impact

Attackers could perform man-in-the-middle attacks to intercept or alter sensitive data transmitted over SSL/TLS connections, such as login credentials or personal information. This exposes users and the application to data theft, impersonation, and loss of trust.

Improper Certificate Validation

Property
Languagerust
Severitymedium
CWECWE-295: Improper Certificate Validation
Confidence LevelHigh
Impact LevelMedium
Likelihood LevelLow

Description

Disabling SSL certificate verification (using SSL_VERIFY_NONE) means the application will accept any server certificate, even if it’s invalid or malicious. This undermines the security of encrypted connections.

Impact

Attackers could intercept or manipulate sensitive data by performing man-in-the-middle (MitM) attacks, potentially leading to credential theft, data leakage, or injection of malicious content. This exposes users and the organization to serious security risks.

Improper Certificate Validation

Property
Languagerust
Severitymedium
CWECWE-295: Improper Certificate Validation
Confidence LevelHigh
Impact LevelMedium
Likelihood LevelLow

Description

The code configures the reqwest HTTP client to accept invalid TLS certificates or hostnames, effectively disabling secure server identity verification. This allows connections to potentially untrusted or malicious servers.

Impact

Attackers could intercept or manipulate data exchanged with external services, perform man-in-the-middle attacks, or impersonate trusted servers. This can lead to data leakage, credential theft, or compromise of sensitive application functionality.

Improper Certificate Validation

Property
Languagerust
Severitymedium
CWECWE-295: Improper Certificate Validation
Confidence LevelHigh
Impact LevelMedium
Likelihood LevelLow

Description

The code is configuring a TLS client using dangerous settings that bypass or replace standard certificate verification. This can disable critical SSL checks, making connections insecure.

Impact

If exploited, attackers could intercept or manipulate encrypted traffic using man-in-the-middle attacks, potentially exposing sensitive data or allowing session hijacking. This compromises the confidentiality and integrity of client-server communications.

Improper Control of Dynamically-Managed Code Resources

Property
Languageyaml
Severitylow
CWECWE-913: Improper Control of Dynamically-Managed Code Resources
OWASPA01:2021 - Broken Access Control
Confidence LevelLow
Impact LevelMedium
Likelihood LevelLow

Description

This GitHub Actions workflow uses ‘pull_request_target’ and checks out code from incoming pull requests, which can execute untrusted code with access to repository secrets. This allows code from external contributors to run in a privileged context.

Impact

An attacker could create a pull request that steals secrets like API keys or deployment credentials, leading to source code leaks, unauthorized access, or further compromise of your repository and infrastructure.

Improper Control of Dynamically-Managed Code Resources

Property
Languageyaml
Severitymedium
CWECWE-913: Improper Control of Dynamically-Managed Code Resources
OWASPA01:2017 - Injection
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelMedium

Description

This GitHub Actions workflow uses the workflow_run trigger and checks out code from an incoming pull request, which allows untrusted PR code to run with access to repository secrets. This setup can let attackers execute their own code in your workflow environment.

Improper Control of Dynamically-Managed Code Resources

Property
Languagego
Severitylow
CWECWE-913: Improper Control of Dynamically-Managed Code Resources
OWASPA01:2021 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

Using reflect.MakeFunc in Go allows creation of functions at runtime, bypassing normal type safety checks. If user input can influence the generated code, this could introduce severe security risks.

Impact

An attacker may exploit this to execute arbitrary code or perform unauthorized actions within your application, potentially leading to data breaches, privilege escalation, or full system compromise.

Improper Control of Dynamically-Managed Code Resources

Property
Languagego
Severitylow
CWECWE-913: Improper Control of Dynamically-Managed Code Resources
OWASPA01:2021 - Broken Access Control
Confidence LevelMedium
Impact LevelLow
Likelihood LevelLow

Description

The code uses a dynamically defined httptrace.ClientTrace, which means function code can be deserialized and executed during HTTP requests without clear visibility or control. This makes it harder to audit what code will run and increases the risk of unexpected behavior.

Improper Control of Generation of Code (‘Code Injection’)

Property
Languageyaml
Severitycritical
CWECWE-94: Improper Control of Generation of Code (‘Code Injection’)
OWASPA03:2021 - Injection
Confidence LevelHigh
Impact LevelHigh
Likelihood LevelHigh

Description

Directly using ${{ github.* }} variables from the GitHub context in the script: field of actions/github-script can allow untrusted user input to be executed as code. This exposes your workflow to code injection attacks.

Impact

An attacker could inject malicious code into the GitHub Actions runner, potentially stealing secrets, modifying your repository, or accessing sensitive data. This can result in compromised credentials, unauthorized repository changes, and broader security breaches in your CI/CD pipeline.

Improper Control of Generation of Code (‘Code Injection’)

Property
Languagecsharp
Severitymedium
CWECWE-94: Improper Control of Generation of Code (‘Code Injection’)
OWASPA03:2021 - Injection
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelMedium

Description

Passing user-controlled input directly to Razor.Parse allows attackers to inject and execute malicious code within the server application. This occurs when untrusted data is used to generate or render Razor templates without proper validation or sanitization.

Impact

If exploited, attackers can execute arbitrary code on the server, potentially gaining full control over the application and its data. This can lead to data breaches, system compromise, and unauthorized access to sensitive resources.