Target URL is tainted by user input
|
High |
Step |
Data Validation |
CWE-22
CWE-233
CWE-918
CWE-20
|
Unsafe regular expression
|
High |
Step |
Data Validation |
CWE-1333
|
Unsafe variable is used to define host
|
High |
Step |
Data Validation |
CWE-20
|
Use of weak hash algorithms
|
High |
AssignMessage
HMAC
JavaScript |
Secure Configuration |
CWE-327
|
User-controlled data in ServiceCallout
|
High |
Step |
Data Validation |
CWE-233
CWE-20
|
AccessControl allows all IPs
|
Medium |
AccessControl |
Data Validation |
CWE-290
|
Condition has undefined variables
|
Medium |
Step
RouteRule
Flow |
Code Quality |
CWE-570
CWE-571
|
Error flow variable is set but not checked in request phase
|
Medium |
Step |
Error Handling |
CWE-390
|
Flow accepts requests with any method
|
Medium |
Flow |
Data Validation |
CWE-749
|
Flow doesn't limit HTTP methods correctly
|
Medium |
Flow |
Data Validation |
CWE-749
|
Insecure JSONThreatProtection policy
|
Medium |
JSONThreatProtection |
Code Quality
Data Validation |
CWE-770
CWE-20
|
Insecure token expiration configuration
|
Medium |
OAuthV2 |
Secure Configuration |
CWE-613
|
Lack of DefaultFaultRule
|
Medium |
Target
Proxy |
Error Handling |
CWE-390
|
Masked flow variable is written into unmasked one
|
Medium |
Step |
Data at Rest |
CWE-532
|
MatchesPath is applied to a static parameter
|
Medium |
Target
Proxy |
Code Quality
Data Validation |
CWE-20
|
No SpikeArrest policy is applied
|
Medium |
Proxy |
Code Quality
DoS Protection |
CWE-770
|
Private flow variable is written into public one
|
Medium |
Step |
Data at Rest |
CWE-532
|
ServiceCallout policy uses default message object as a request
|
Medium |
ServiceCallout |
Code Quality |
CWE-200
|
ServiceCallout policy uses default message object as a response
|
Medium |
ServiceCallout |
Code Quality |
CWE-200
|
Unreachable Flow
|
Medium |
Proxy |
Code Quality |
CWE-561
|