Policy is not linked to step
|
Info |
Proxy |
Code Quality |
CWE-561
|
Policy errors are not caught
|
Low |
Step |
Error Handling |
CWE-390
|
Overcomplicated or malformed condition
|
Low |
Step
RouteRule
Flow |
Code Quality |
CWE-570
CWE-571
|
Open Redirect
|
High |
Step |
Data Validation |
CWE-601
CWE-20
|
No mask configuration for the proxy
|
Low |
Proxy |
Code Quality |
|
No TLS protocol specified in connection definition
|
High |
ServiceCallout
MessageLogging
Target |
Data in Transit |
CWE-327
|
No SpikeArrest policy is applied
|
Medium |
Proxy |
Code Quality
DoS Protection |
CWE-770
|
Missing security headers
|
Low |
Proxy |
Secure Configuration |
CWE-523
|
Missing API versioning
|
Info |
Proxy |
Secure Configuration |
CWE-710
|
MatchesPath is applied to a static parameter
|
Medium |
Target
Proxy |
Code Quality
Data Validation |
CWE-20
|
Masked flow variable is written into unmasked one
|
Medium |
Step |
Data at Rest |
CWE-532
|
Lack of certificate validation
|
Critical |
ServiceCallout
MessageLogging
Target |
Data in Transit |
CWE-295
|
Lack of DefaultFaultRule
|
Medium |
Target
Proxy |
Error Handling |
CWE-390
|
JWT/JWS is decoded but not verified in the same flow phase
|
Critical |
Step |
Authentication & Authorisation |
CWE-347
|
JSONThreatProtection policy is not applied to a request body with JSON type
|
High |
Flow |
Data Validation |
CWE-502
CWE-20
|
Insecure token expiration configuration
|
Medium |
OAuthV2 |
Secure Configuration |
CWE-613
|
Insecure Quota configuration
|
High |
Step |
Code Quality
Data Validation |
CWE-770
|
Insecure JSONThreatProtection policy
|
Medium |
JSONThreatProtection |
Code Quality
Data Validation |
CWE-770
CWE-20
|
Flow doesn't limit HTTP methods correctly
|
Medium |
Flow |
Data Validation |
CWE-749
|
Flow accepts requests with any method
|
Medium |
Flow |
Data Validation |
CWE-749
|