Feat/new endpoints#2
Conversation
8dde616 to
d6b514b
Compare
d6b514b to
f3f2592
Compare
| } | ||
|
|
||
| response.setContentType("application/json"); | ||
| response.getWriter().write("{\"status\":\"success\",\"cacheControl\":\"" + directive + "\"}"); |
Check failure
Code scanning / Seqra
Potential cross-site scripting (XSS)
| String dispositionHeader = disposition + "; filename=" + filename; | ||
| response.setHeader("Content-Disposition", dispositionHeader); | ||
| response.setContentType("application/octet-stream"); | ||
| response.getWriter().write("File content for: " + filename); |
Check failure
Code scanning / Seqra
Potential cross-site scripting (XSS)
| response.setHeader("X-Campaign", campaign); | ||
| } | ||
|
|
||
| response.sendRedirect(destination); |
Check warning
Code scanning / Seqra
Application redirects to user-manipulated URL which can be malicious
| @Parameter(description = "Additional headers") @RequestParam(required = false) String additionalHeaders, | ||
| HttpServletResponse response) throws IOException { | ||
|
|
||
| response.setHeader("Cache-Control", directive); |
Check warning
Code scanning / Seqra
HTTP response splitting
| for (String header : headers) { | ||
| String[] parts = header.split(":", 2); | ||
| if (parts.length == 2) { | ||
| response.setHeader(parts[0].trim(), parts[1].trim()); |
Check warning
Code scanning / Seqra
HTTP response splitting
59fa199 to
a4f38aa
Compare
a4f38aa to
23f49a9
Compare
48fb362 to
4557fe5
Compare
| } | ||
|
|
||
| response.setContentType("application/json"); | ||
| response.getWriter().write("{\"status\":\"success\",\"cacheControl\":\"" + directive + "\"}"); |
Check failure
Code scanning / OpenTaint + ZAP
Potential cross-site scripting (XSS) Error
| String dispositionHeader = disposition + "; filename=" + filename; | ||
| response.setHeader("Content-Disposition", dispositionHeader); | ||
| response.setContentType("application/octet-stream"); | ||
| response.getWriter().write("File content for: " + filename); |
Check failure
Code scanning / OpenTaint + ZAP
Potential cross-site scripting (XSS) Error
| response.setHeader("X-Campaign", campaign); | ||
| } | ||
|
|
||
| response.sendRedirect(destination); |
Check warning
Code scanning / OpenTaint + ZAP
Application redirects to user-manipulated URL which can be malicious Warning
| @Parameter(description = "Additional headers") @RequestParam(required = false) String additionalHeaders, | ||
| HttpServletResponse response) throws IOException { | ||
|
|
||
| response.setHeader("Cache-Control", directive); |
Check warning
Code scanning / OpenTaint + ZAP
HTTP response splitting Warning
| for (String header : headers) { | ||
| String[] parts = header.split(":", 2); | ||
| if (parts.length == 2) { | ||
| response.setHeader(parts[0].trim(), parts[1].trim()); |
Check warning
Code scanning / OpenTaint + ZAP
HTTP response splitting Warning
No description provided.