User-controlled data in ServiceCallout
|
High |
Step |
Data Validation |
CWE-233
CWE-20
|
Unused flow variables
|
Info |
Step |
Code Quality |
CWE-563
|
Unsafe variable is used to define host
|
High |
Step |
Data Validation |
CWE-20
|
Unsafe regular expression
|
High |
Step |
Data Validation |
CWE-1333
|
Target URL is tainted by user input
|
High |
Step |
Data Validation |
CWE-22
CWE-233
CWE-918
CWE-20
|
Step operates undefined flow variables
|
Low |
Step |
Code Quality |
CWE-457
|
Sensitive information is in the source code
|
Critical |
Step |
Data at Rest |
CWE-256
CWE-312
|
Request content is stringified
|
Critical |
Step |
Data Validation
DoS Protection |
CWE-20
|
Request Content is tainted by user input
|
High |
Step |
Data Validation |
CWE-20
CWE-116
|
Private flow variable is written into public one
|
Medium |
Step |
Data at Rest |
CWE-532
|
Policy sets confidential data in URL parameters
|
High |
Step |
Data in Transit |
CWE-598
|
Policy errors are not caught
|
Low |
Step |
Error Handling |
CWE-390
|
Overcomplicated or malformed condition
|
Low |
Step
RouteRule
Flow |
Code Quality |
CWE-570
CWE-571
|
Open Redirect
|
High |
Step |
Data Validation |
CWE-601
CWE-20
|
Masked flow variable is written into unmasked one
|
Medium |
Step |
Data at Rest |
CWE-532
|
JWT/JWS is decoded but not verified in the same flow phase
|
Critical |
Step |
Authentication & Authorisation |
CWE-347
|
JSONThreatProtection policy is not applied to a request body with JSON type
|
High |
Flow |
Data Validation |
CWE-502
CWE-20
|
Insecure Quota configuration
|
High |
Step |
Code Quality
Data Validation |
CWE-770
|
Flow doesn't limit HTTP methods correctly
|
Medium |
Flow |
Data Validation |
CWE-749
|
Flow accepts requests with any method
|
Medium |
Flow |
Data Validation |
CWE-749
|