-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Checkmarx (SAST): Hardcoded_password_in_Connection_String
Security Issue: Read More about Hardcoded_password_in_Connection_String
Checkmarx Project: cx-boris-goman/borJavaVul
Repository URL: https://github.com/cx-boris-goman/borJavaVul
Branch: main
Scan ID: df63710a-c9c2-4406-9ad7-319bd05458a4
The application contains hardcoded connection details, ""notsafe!"", at line 13 of /ReturnSevered1.bas. This connection string contains a hardcoded password, which is used in dailypassword at line 33 of /ReturnSevered1.bas to connect to a database server with open. This can expose the database password, and impede proper password management.
Result 1:
Severity: MEDIUM
State: TO_VERIFY
Status: RECURRENT
Attack Vector:
1. ""notsafe!"": /ReturnSevered1.bas[13,22]
2. hardcodedpassword: /ReturnSevered1.bas[13,2]
3. hardcodedpassword: /ReturnSevered1.bas[33,11]
4. open: /ReturnSevered1.bas[33,5]
Review result in Checkmarx One: Hardcoded_password_in_Connection_String