Skip to content

Feat/new endpoints#2

Open
Gr-i-niy wants to merge 14 commits into
feat/add_vulnsfrom
feat/new_endpoints
Open

Feat/new endpoints#2
Gr-i-niy wants to merge 14 commits into
feat/add_vulnsfrom
feat/new_endpoints

Conversation

@Gr-i-niy
Copy link
Copy Markdown
Owner

No description provided.

@Gr-i-niy Gr-i-niy force-pushed the feat/new_endpoints branch 2 times, most recently from 8dde616 to d6b514b Compare February 25, 2026 08:55
}

response.setContentType("application/json");
response.getWriter().write("{\"status\":\"success\",\"cacheControl\":\"" + directive + "\"}");

Check failure

Code scanning / Seqra

Potential cross-site scripting (XSS)

Potential XSS: writing user input directly to a web page.
String dispositionHeader = disposition + "; filename=" + filename;
response.setHeader("Content-Disposition", dispositionHeader);
response.setContentType("application/octet-stream");
response.getWriter().write("File content for: " + filename);

Check failure

Code scanning / Seqra

Potential cross-site scripting (XSS)

Potential XSS: writing user input directly to a web page.
response.setHeader("X-Campaign", campaign);
}

response.sendRedirect(destination);

Check warning

Code scanning / Seqra

Application redirects to user-manipulated URL which can be malicious

Application redirects to a destination URL specified by a user-supplied parameter that is not validated. This could direct users to malicious locations. Consider using an allowlist to validate URLs.
@Parameter(description = "Additional headers") @RequestParam(required = false) String additionalHeaders,
HttpServletResponse response) throws IOException {

response.setHeader("Cache-Control", directive);

Check warning

Code scanning / Seqra

HTTP response splitting

Older Java application servers are vulnerable to HTTP response splitting, which may occur if an HTTP request can be injected with CRLF characters.
for (String header : headers) {
String[] parts = header.split(":", 2);
if (parts.length == 2) {
response.setHeader(parts[0].trim(), parts[1].trim());

Check warning

Code scanning / Seqra

HTTP response splitting

Older Java application servers are vulnerable to HTTP response splitting, which may occur if an HTTP request can be injected with CRLF characters.
}

response.setContentType("application/json");
response.getWriter().write("{\"status\":\"success\",\"cacheControl\":\"" + directive + "\"}");

Check failure

Code scanning / OpenTaint + ZAP

Potential cross-site scripting (XSS) Error

Potential XSS: writing user input directly to a web page.
String dispositionHeader = disposition + "; filename=" + filename;
response.setHeader("Content-Disposition", dispositionHeader);
response.setContentType("application/octet-stream");
response.getWriter().write("File content for: " + filename);

Check failure

Code scanning / OpenTaint + ZAP

Potential cross-site scripting (XSS) Error

Potential XSS: writing user input directly to a web page.
response.setHeader("X-Campaign", campaign);
}

response.sendRedirect(destination);

Check warning

Code scanning / OpenTaint + ZAP

Application redirects to user-manipulated URL which can be malicious Warning

Application redirects to a destination URL specified by a user-supplied parameter that is not validated. This could direct users to malicious locations. Consider using an allowlist to validate URLs.
@Parameter(description = "Additional headers") @RequestParam(required = false) String additionalHeaders,
HttpServletResponse response) throws IOException {

response.setHeader("Cache-Control", directive);

Check warning

Code scanning / OpenTaint + ZAP

HTTP response splitting Warning

Older Java application servers are vulnerable to HTTP response splitting, which may occur if an HTTP request can be injected with CRLF characters.
for (String header : headers) {
String[] parts = header.split(":", 2);
if (parts.length == 2) {
response.setHeader(parts[0].trim(), parts[1].trim());

Check warning

Code scanning / OpenTaint + ZAP

HTTP response splitting Warning

Older Java application servers are vulnerable to HTTP response splitting, which may occur if an HTTP request can be injected with CRLF characters.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants