[CIN-685] update copyright header for 2025 #4746
Annotations
1 error and 1 warning
Run SAST Scan
[07 Jan 2025 14:50:00,0811] PIPELINE-SCAN INFO: Pipeline Scan Tool Version 24.12.1-0.
[07 Jan 2025 14:50:00,0824] PIPELINE-SCAN INFO: Loading policy file Alfresco_Default.json
[07 Jan 2025 14:50:00,0826] PIPELINE-SCAN INFO: Successfully retrieved the policy
[07 Jan 2025 14:50:00,0827] PIPELINE-SCAN INFO: Policy name: Alfresco Default
[07 Jan 2025 14:50:00,0827] PIPELINE-SCAN INFO: CWE filter:
[07 Jan 2025 14:50:00,0827] PIPELINE-SCAN INFO: Severity filter: 3, 4, 5,
[07 Jan 2025 14:50:00,0828] PIPELINE-SCAN INFO: Beginning scanning of 'distribution/target/alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip'.
[07 Jan 2025 14:50:00,0830] PIPELINE-SCAN INFO: Sending 123146112 bytes to the server for analysis.
[07 Jan 2025 14:50:38,0780] PIPELINE-SCAN INFO: Upload complete.
[07 Jan 2025 14:50:38,0780] PIPELINE-SCAN INFO: Scan ID: 097f81fc-0d65-47ad-b784-2a7c3f8d4a52
[07 Jan 2025 14:50:39,0017] PIPELINE-SCAN INFO: Analysis Started.
===========================
Found 6 Scannable modules.
===========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip
[07 Jan 2025 14:53:39,0121] PIPELINE-SCAN INFO: Analysis Complete.
[07 Jan 2025 14:53:39,0123] PIPELINE-SCAN INFO: Analysis Results: Received 5159 bytes in 218295ms.
[07 Jan 2025 14:53:39,0125] PIPELINE-SCAN INFO: Writing Raw JSON Results to file '/home/runner/work/hxinsight-connector/hxinsight-connector/results.json'.
[07 Jan 2025 14:53:39,0127] PIPELINE-SCAN INFO: Applying custom severity 4 to cwe 80
[07 Jan 2025 14:53:39,0129] PIPELINE-SCAN INFO: Writing Filtered JSON Results to file '/home/runner/work/hxinsight-connector/hxinsight-connector/filtered_results.json'.
Scan Summary:
PIPELINE_SCAN_VERSION: 24.12.1-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: hxinsight-connector
SCAN_ID: 097f81fc-0d65-47ad-b784-2a7c3f8d4a52
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 4388 bytes
====================
Analysis Successful.
====================
==========================
Found 6 Scannable modules.
==========================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip
===================
Analyzed 6 modules.
===================
alfresco-hxinsight-connector-bulk-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-hxinsight-extension-1.0.2-SNAPSHOT.jar
alfresco-hxinsight-connector-live-ingester-1.0.2-SNAPSHOT-app.jar
alfresco-hxinsight-connector-prediction-applier-1.0.2-SNAPSHOT-app.jar
JS files within spring-security-web-6.4.2.jar
JS files within alfresco-hxinsight-connector-distribution-1.0.2-SNAPSHOT.zip
==================
Analyzed 2 issues.
==================
--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: <span>This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. </span> <span>Use contextual escaping on all untrusted
|
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Loading