All posts by rocco

CWE-110 – Struts: Validator Without Form Field

Read Time:29 Second

Description

Validation fields that do not appear in forms they are associated with indicate that the validation logic is out of date.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1164
CWE-20

 

Consequences

Other: Other

It is critically important that validation logic be maintained and kept in sync with the rest of the application. Unchecked input is the root cause of some of today’s worst and most common software security problems. Cross-site scripting, SQL injection, and process control vulnerabilities all stem from incomplete or absent input validation.

 

Potential Mitigations

CVE References

CWE-1067 – Excessive Execution of Sequential Searches of Data Resource

Read Time:15 Second

Description

The software contains a data query against an SQL table or view
that is configured in a way that does not utilize an index and may cause
sequential searches to be performed.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1176

 

Consequences

Other: Reduce Performance

 

Potential Mitigations

CVE References

CWE-107 – Struts: Unused Validation Form

Read Time:26 Second

Description

An unused validation form indicates that validation logic is not up-to-date.

It is easy for developers to forget to update validation logic when they remove or rename action form mappings. One indication that validation logic is not being properly maintained is the presence of an unused validation form.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1164
CWE-20

 

Consequences

Other: Quality Degradation

 

Potential Mitigations

Phase: Implementation

Description: 

Remove the unused Validation Form from the validation.xml file.

CVE References

CWE-1070 – Serializable Data Element Containing non-Serializable Item Elements

Read Time:13 Second

Description

The software contains a serializable, storable data element such as a field or member,
but the data element contains member elements that are not
serializable.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References