You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+20Lines changed: 20 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,10 @@ This application contains the following types of security vulnerabilities:
24
24
4.**LDAP Injection** - Unescaped user input in LDAP filters
25
25
5.**Weak Cryptography** - Use of MD5 and weak random number generation
26
26
6.**Hard-coded Secrets** - Embedded credentials and encryption keys
27
+
7.**Vulnerable Dependencies** - Uses `commons-collections:3.2.1` which has known deserialization vulnerabilities (CVE-2015-6420, CVE-2017-15708). This dependency appears in multiple paths in the dependency graph:
28
+
- As a direct dependency
29
+
- As a transitive dependency through `commons-beanutils:1.9.2`
30
+
- As a transitive dependency through `commons-digester:2.1` → `commons-beanutils:1.8.3`
27
31
28
32
## CodeQL Analysis
29
33
@@ -45,8 +49,24 @@ mvn test
45
49
46
50
# Run the application (demonstrates vulnerabilities)
- A transitive dependency through `commons-beanutils` (marked as "omitted for duplicate")
68
+
- A transitive dependency through `commons-digester` → `commons-beanutils`
69
+
50
70
## Warning
51
71
52
72
⚠️ **This application contains intentional security vulnerabilities and should never be deployed in a production environment.** It is designed solely for educational purposes and CodeQL demonstration.
0 commit comments