Revert "Bump dependency.spring.version from 6.1.14 to 6.2.0 (#3038)" #966
master_release.yml
on: push
Matrix: run_ci / ags_mysql_tests
Matrix: run_ci / ags_postgresql_tests
Matrix: run_ci / all_unit_tests_suite
Matrix: run_ci / remote_api_app_context_test_suites
Matrix: run_ci / repository_app_context_test_suites
Matrix: run_ci / repository_mariadb_tests
Matrix: run_ci / tas_tests
run_ci
/
Source Clear Scan (SCA)
3m 19s
run_ci
/
Pipeline SAST Scan
5m 57s
run_ci
/
PMD Scan
0s
run_ci
/
Repository - MariaDB 10.6 tests
4m 56s
run_ci
/
Repository - MySQL 8 tests
5m 39s
run_ci
/
Repository - PostgreSQL 13.12 tests
4m 42s
run_ci
/
Repository - PostgreSQL 14.9 tests
4m 59s
run_ci
/
Repository - PostgreSQL 15.4 tests
4m 50s
run_ci
/
Repository - Messaging tests
1m 58s
run_ci
/
Share Services - ShareServicesTestSuite
3m 0s
run_ci
/
AGS Community Rest API Tests
26m 31s
run_ci
/
Test Tomcat deployment of api explorer
4m 1s
Update alfresco-enterprise-repo
0s
Annotations
1 error
run_ci / Pipeline SAST Scan
[22 Nov 2024 14:18:20,0775] PIPELINE-SCAN INFO: Pipeline Scan Tool Version 24.10.0-0.
[22 Nov 2024 14:18:20,0794] PIPELINE-SCAN INFO: Loading policy file Alfresco_Default.json
[22 Nov 2024 14:18:20,0796] PIPELINE-SCAN INFO: Successfully retrieved the policy
[22 Nov 2024 14:18:20,0796] PIPELINE-SCAN INFO: Policy name: Alfresco Default
[22 Nov 2024 14:18:20,0796] PIPELINE-SCAN INFO: CWE filter:
[22 Nov 2024 14:18:20,0796] PIPELINE-SCAN INFO: Severity filter: 3, 4, 5,
[22 Nov 2024 14:18:20,0797] PIPELINE-SCAN INFO: Beginning scanning of 'packaging/war/target/alfresco.war'.
[22 Nov 2024 14:18:20,0800] PIPELINE-SCAN INFO: Sending 136934540 bytes to the server for analysis.
[22 Nov 2024 14:19:11,0719] PIPELINE-SCAN INFO: Upload complete.
[22 Nov 2024 14:19:11,0719] PIPELINE-SCAN INFO: Scan ID: ee045152-0d0a-453b-98b7-d44b3863231b
[22 Nov 2024 14:19:12,0045] PIPELINE-SCAN INFO: Analysis Started.
===========================
Found 2 Scannable modules.
===========================
alfresco.war
JS files within alfresco.war
[22 Nov 2024 14:21:32,0819] PIPELINE-SCAN INFO: Analysis Complete.
[22 Nov 2024 14:21:32,0821] PIPELINE-SCAN INFO: Analysis Results: Received 11222 bytes in 192024ms.
[22 Nov 2024 14:21:32,0825] PIPELINE-SCAN INFO: Writing Raw JSON Results to file '/home/runner/work/alfresco-community-repo/alfresco-community-repo/results.json'.
[22 Nov 2024 14:21:32,0827] PIPELINE-SCAN INFO: Applying custom severity 4 to cwe 80
[22 Nov 2024 14:21:32,0830] PIPELINE-SCAN INFO: Writing Filtered JSON Results to file '/home/runner/work/alfresco-community-repo/alfresco-community-repo/filtered_results.json'.
Scan Summary:
PIPELINE_SCAN_VERSION: 24.10.0-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: alfresco-community-repo
SCAN_ID: ee045152-0d0a-453b-98b7-d44b3863231b
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 10760 bytes
====================
Analysis Successful.
====================
==========================
Found 2 Scannable modules.
==========================
alfresco.war
JS files within alfresco.war
===================
Analyzed 2 modules.
===================
alfresco.war
JS files within alfresco.war
==================
Analyzed 5 issues.
==================
--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: <span>This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. </span> <span>Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/79.html">CWE</a> <a href="https://owasp.org/www-community/attacks/xss/">OWASP</a> <a href="https://docs.veracode.com/r/review_cleansers">Supported Cleansers</a></span>
https://downl
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
Veracode Pipeline-Scan Results
Expired
|
3.54 KB |
|
Veracode Pipeline-Scan Results (Human Readable)
Expired
|
1.83 KB |
|