You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Method at line 11 of /SAST.py gets a parameter from a user request from echo. This parameter value flows through the code and is eventually used to access application state altering functionality. This may enable Cross-Site Request Forgery (CSRF).
Result 1: Severity: MEDIUM State: TO_VERIFY Status: RECURRENT Attack Vector:
Checkmarx (SAST): CSRF
Security Issue: Read More about CSRF
Checkmarx Project: Supakorn19934/SAST
Repository URL: https://github.com/Supakorn19934/SAST
Branch: main
Scan ID: 58352b0c-be48-4e66-a0f2-70d4f58b2c21
Method at line 11 of /SAST.py gets a parameter from a user request from echo. This parameter value flows through the code and is eventually used to access application state altering functionality. This may enable Cross-Site Request Forgery (CSRF).
Result 1:
Severity: MEDIUM
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. echo: /SAST.py[11,5]
Review result in Checkmarx One: CSRF
The text was updated successfully, but these errors were encountered: