Skip to content

Conversation

@kingthorin
Copy link
Member

@kingthorin kingthorin commented Sep 25, 2025

Overview

  • Remove unnecessary try/catch when raising alert.
  • Move always used variable assignment to be a constant.
  • Ensure Evidence values are literal and not assembled.
  • Adjust Confidence when findings are based on 40x authn/authz type responses.
  • Corrected regex quantifier on third party content matching.
  • May now raise more alerts because the HTTP method/verb comparison previously may have been values with leading or trailing space which would not have matched.

@psiinon
Copy link
Member

psiinon commented Sep 25, 2025

Logo
Checkmarx One – Scan Summary & Detailsa25459c8-4288-4ac5-bad2-c3dc49e0ab6e

New Issues (12)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2024-53990 Maven-org.asynchttpclient:async-http-client-2.12.3
detailsRecommended version: 2.12.4
Description: The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making a...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: m5ypO9rQ4ox8ZOSwRBouhgqPgWtouFfeq3HIMS4ueLI%3D
Vulnerable Package
HIGH CVE-2017-9096 Maven-com.lowagie:itext-2.1.7
detailsDescription: The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable external entities, which might allow remote attackers to conduct XML ext...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: %2Fh3n%2B6%2FOAjPysxX%2BPcuJWCQajD9UBZxTXilp0cc4dqY%3D
Vulnerable Package
HIGH CVE-2020-36518 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.1
detailsRecommended version: 2.13.4.1
Description: jackson-databind before 2.12.6.1 and 2.13.x before 2.13.2.1 allows a Java StackOverflow exception and denial of service via a large depth of neste...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected]/ScanRuleMetadata.java - ... - [email protected]

ID: mPSz3PWUUf5IcsVplLMqkQVmEtNcy7uRohfyd647JBQ%3D
Vulnerable Package
HIGH CVE-2022-4065 Maven-org.testng:testng-7.5
detailsRecommended version: 7.5.1
Description: A vulnerability was found in cbeust testng. It has been declared as critical. Affected by this vulnerability is the function "testngXmlExistsInJar"...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: XA%2B17Z54GH0OU2sreqYmLo2RGTYVcyelPS%2FB8eLBLLM%3D
Vulnerable Package
HIGH CVE-2022-42003 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.1
detailsRecommended version: 2.13.4.1
Description: In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avo...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected]/ScanRuleMetadata.java - ... - [email protected]

ID: uISb6GThKmT61FIb4DKK59KXoGuzdiMCGpSXY3%2BHpdE%3D
Vulnerable Package
HIGH CVE-2022-42004 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.1
detailsRecommended version: 2.13.4.1
Description: In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in "BeanDeserializer._deserializeFromArray"...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected]/ScanRuleMetadata.java - ... - [email protected]

ID: w9O0Jn%2FXEpRMWXZLtawTDbvxhU4xVReYty6q1Nb9%2FMM%3D
Vulnerable Package
HIGH CVE-2024-7254 Maven-com.google.protobuf:protobuf-java-3.25.1
detailsRecommended version: 3.25.5
Description: Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups/series of SGROUP tags can corrupted by exce...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: [email protected] - ... - [email protected]

ID: YUZkmmxz8aiNB%2B0Y%2FWLppb6H3pF9UA7ShNJsgAyzvqg%3D
Vulnerable Package
HIGH CVE-2025-52999 Maven-com.fasterxml.jackson.core:jackson-core-2.13.1
detailsRecommended version: 2.15.0
Description: The jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. In versions pr...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: skipChildren@.../har/HarImporterType.java - ... - [email protected]/ReaderBasedJsonParser.java

ID: DQ3XnEHSlNtGZ4ZFYWUi7CloDNWQgu2igyMNdXKj6Pw%3D
Vulnerable Package
MEDIUM CVE-2018-10237 Maven-com.google.guava:guava-19.0
detailsRecommended version: 32.0.0.jre-redhat-00001
Description: Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against se...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: t26hpgMlKTk%2Bhxt9aUwckPWQ9CLevbm%2BM%2FNPDdXv10s%3D
Vulnerable Package
MEDIUM CVE-2022-24823 Maven-io.netty:netty-common-4.1.73.Final
detailsRecommended version: 4.1.108.Final-redhat-00002
Description: Netty is an open-source, asynchronous event-driven network application framework. The packages `io.netty:netty-all` and `io.netty:netty-common` 4.1...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: WPBtE1i%2B9LAxk8qnwdptrh6XXxkts9q%2FRiZpIueZpG0%3D
Vulnerable Package
MEDIUM CVE-2023-34462 Maven-io.netty:netty-handler-4.1.73.Final
detailsRecommended version: 4.1.118.Final
Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clien...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: SWmP9dlEkBYTgxSbzoGhDsl1sxKt5BkoaZopUM8I7O0%3D
Vulnerable Package
MEDIUM Use_Of_Hardcoded_Password /addOns/zest/src/main/java/org/zaproxy/zap/extension/zest/ZestAuthenticationRunner.java: 64
detailsThe application uses the hard-coded password PASSWORD for authentication purposes, either using it to verify users' identities, or to access anoth...
ID: atCyvEBdIHIXTFZfXUh2F6WGL5g%3D
Attack Vector
Fixed Issues (7)

Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
MEDIUM Use_Of_Hardcoded_Password /addOns/authhelper/src/main/java/org/zaproxy/addon/authhelper/AuthUtils.java: 173
MEDIUM Use_Of_Hardcoded_Password /addOns/zest/src/main/java/org/zaproxy/zap/extension/zest/ZestAuthenticationRunner.java: 65
MEDIUM Use_Of_Hardcoded_Password /addOns/zest/src/main/java/org/zaproxy/zap/extension/zest/ZestAuthenticationRunner.java: 68
LOW Heap_Inspection /addOns/authhelper/src/test/java/org/zaproxy/addon/authhelper/AuthUtilsUnitTest.java: 1357
LOW Heap_Inspection /addOns/authhelper/src/test/java/org/zaproxy/addon/authhelper/AuthUtilsUnitTest.java: 1375
LOW Heap_Inspection /addOns/authhelper/src/test/java/org/zaproxy/addon/authhelper/AuthUtilsUnitTest.java: 1328
LOW Heap_Inspection /addOns/authhelper/src/test/java/org/zaproxy/addon/authhelper/AuthUtilsUnitTest.java: 1312

Use @Checkmarx to reach out to us for assistance.

Just send a PR comment with @Checkmarx followed by a natural language request.

Examples: @Checkmarx how are you able to help me? @Checkmarx rescan this PR

@kingthorin kingthorin force-pushed the http-methods-fixes branch 6 times, most recently from 464ca24 to f85bce4 Compare September 30, 2025 16:32
@kingthorin kingthorin marked this pull request as ready for review September 30, 2025 16:34
@kingthorin kingthorin force-pushed the http-methods-fixes branch 2 times, most recently from 57bb411 to 1a3cc4e Compare September 30, 2025 16:42
@thc202
Copy link
Member

thc202 commented Nov 5, 2025

It's unclear to me what's this is trying to achieve, address an FP or introduce more FPs?

@kingthorin
Copy link
Member Author

Hahaha okay. I'll revert the trim bit and just document it with a comment for future changes?

@thc202
Copy link
Member

thc202 commented Nov 5, 2025

@kingthorin
Copy link
Member Author

Thank you for being specific, I'll review why I removed that. (It may have simply been a testing change that I forgot to revert before pushing.)

@kingthorin
Copy link
Member Author

Addressed.

@kingthorin kingthorin force-pushed the http-methods-fixes branch 2 times, most recently from 2bdc234 to 482612a Compare November 5, 2025 14:56
@kingthorin kingthorin marked this pull request as draft November 5, 2025 15:12
@kingthorin
Copy link
Member Author

Back to draft, just found another issue.

@kingthorin kingthorin marked this pull request as ready for review November 5, 2025 15:25
@kingthorin
Copy link
Member Author

kingthorin commented Nov 5, 2025

It was a smaller issue than I initially thought, should be good to go now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

3 participants