[Checkmarx] JavaScript_Server_Side_Vulnerabilities - Use_Of_Hardcoded_Password : 2136262186
miguelfreitas93 opened this issue · comments
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
1 Node - Line 36 - getInput
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
2 Node - Line 36 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 35 to 37
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 35 to 37 in 7873b79
3 Node - Line 77 - cxPassword
checkmarx-github-action/src/cxsast.js
Lines 76 to 78
in
7873b79
checkmarx-github-action/src/cxsast.js
Lines 76 to 78 in 7873b79
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html
Information - Use_Of_Hardcoded_Password
0 Node - Line 36 - "cxPassword"
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
1 Node - Line 36 - getInput
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
2 Node - Line 36 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L35-L37
3 Node - Line 77 - cxPassword
https://github.com/checkmarx-ts/checkmarx-github-action/blob/facff162845a8332880e780f7cec71927aac746a/src/cxsast.js#L76-L78
Comments
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:52:20 PM]: Changed severity to Info
Miguel Freitas checkmarx-github-action-master, [Monday, June 8, 2020 9:51:51 PM]: Changed status to Confirmed
Project Details
Checkmarx Version: 9.0.0.40085 HF1
Project ID: 6
Project Name: checkmarx-github-action-master
Preset: Checkmarx Default
Owner: miguel
Team: CxServer\SP\EMEA
Scan Details
Initiator Name: Miguel Freitas
Scan ID: 1000039
LOC: 4642
Files Scanned: 10
Scan Type: Full
Scan URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=1000039&projectid=6
Scan Comment: git master@7873b79400662eb591cf013e49150cc3df417edb
Scan Type: 00h:01m:16s
Scan Start Date: Tue Jun 09 2020 23:58:09 GMT+0100 (British Summer Time)
Scan Time: 00h:01m:16s
Source Origin: LocalPath
Visibility: Public
Result Details
Query ID: 3933
Query Path: JavaScript\Cx\JavaScript Server Side Vulnerabilities\Use Of Hardcoded Password Version:1
Query Group: JavaScript_Server_Side_Vulnerabilities
Query Name: Use_Of_Hardcoded_Password
Query Language: JavaScript
Query Language Hash: 0935562945055365
Query Language Change Date: Tue May 19 2020 00:00:00 GMT+0100 (British Summer Time)
Query Version Code: 97095146
Query Severity: Low
Query Severity Index: 1
Similarity ID: 2136262186
Path ID: 3
Result ID: 1000039
Result State: 2
Result Severity: Information
Result Status: Recurrent
Result Assignee:
Mitigation Details
Checkmarx Recommendations URL: https://cxprivatecloud.checkmarx.net/CxWebClient/ScanQueryDescription.aspx?queryID=3933&queryVersionCode=97095146&queryTitle=Use_Of_Hardcoded_Password
CWE ID: 259
CWE URL: https://cwe.mitre.org/data/definitions/259.html