Skip to content

Hardcoded_password_in_Connection_String @ /ReturnSevered1.bas #271

@cx-boris-goman

Description

@cx-boris-goman

Checkmarx (SAST): Hardcoded_password_in_Connection_String
Security Issue: Read More about Hardcoded_password_in_Connection_String
Checkmarx Project: cx-boris-goman/borJavaVul
Repository URL: https://github.com/cx-boris-goman/borJavaVul
Branch: main
Scan ID: df63710a-c9c2-4406-9ad7-319bd05458a4


The application contains hardcoded connection details, ""notsafe!"", at line 13 of /ReturnSevered1.bas. This connection string contains a hardcoded password, which is used in dailypassword at line 33 of /ReturnSevered1.bas to connect to a database server with open. This can expose the database password, and impede proper password management.

Result 1:
Severity: MEDIUM
State: TO_VERIFY
Status: RECURRENT
Attack Vector:

    1. ""notsafe!"": /ReturnSevered1.bas[13,22]
    2. hardcodedpassword: /ReturnSevered1.bas[13,2]
    3. hardcodedpassword: /ReturnSevered1.bas[33,11]
    4. open: /ReturnSevered1.bas[33,5]
    Review result in Checkmarx One: Hardcoded_password_in_Connection_String

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions