-
Notifications
You must be signed in to change notification settings - Fork 253
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[JAVA] CWE-706: Use of Incorrectly-Resolved Name or Reference & CWE-201: Exposure of Sensitive Information Through Sent Data #137
Comments
@intrigus-lgtm as per https://securitylab.github.com/bounties this submission in the Bug Slayer category will require at least 4 CVE to be triaged as a direct result of this query's findings. We understand this is still a work in progress, so please update this issue when your CVE listings start coming in and we'll move the award evaluation process along accordingly. Thanks! |
@intrigus-lgtm Any update on this? |
Still a work in progress... |
Hey @intrigus-lgtm It is my shift again :) Any updates? |
Nice to see you again :) I recently hunted for some "easier" bugs before hunting using this query. Also I'm still waiting for GHSA-7557-4v29-rqw6 to get published. |
Finally, GHSA-7557-4v29-rqw6 got published and CVE-2020-15097 got assigned :) |
Cool, glad it was published. We cannot force maintainers to publish advisories on their repositories. CVEs is another story, probably it is possible to get one assigned if there are disagreements with code owners. |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
@xcorail This is interesting, looks like there was a glitch in automation, so the issue was marked as in status Closed although it is not. |
Sorry about that. An automation bug caused the internal issue to be duplicated. So I closed the duplicate, and that triggered the comment above. But the original internal issue was not closed. |
Closing as per the comment above |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
CVE ID(s)
List the CVE ID(s) associated with this vulnerability. GitHub will automatically link CVE IDs to the GitHub Advisory Database.
Report
Paths that can be influenced by users (= Directory traversal) where the content of the path is returned to the user or where user data is written to.
"Arbitrary read and write"
Query: github/codeql#3794
The text was updated successfully, but these errors were encountered: