✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 194
Info: The cookie's Secure flag is set to False. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 208
Info: The cookie's Secure flag is set to False. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 222
Info: The cookie's Secure flag is set to False. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 119
Info: Cookie's Secure flag is set to False by default. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 255
Info: Cookie's Secure flag is set to False by default. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 259
Info: Cookie's Secure flag is set to False by default. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 349
Info: Cookie's Secure flag is set to False by default. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Path: pygoat/introduction/views.py, line 355
Info: Cookie's Secure flag is set to False by default. Set it to true to protect the cookie from man-in-the-middle attacks.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 119
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 194
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 208
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 222
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 255
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 259
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 349
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Low] Sensitive Cookie Without 'HttpOnly' Flag
Path: pygoat/introduction/views.py, line 355
Info: Cookie's HttpOnly flag is set to False by default. Set it to true
to protect the cookie from possible malicious code on client side.
✗ [Medium] Insecure Xml Parser
Path: pygoat/introduction/views.py, line 161
Info: xml.sax.make_parser is considered insecure. Use an analog from the defusedxml package.
✗ [Medium] Insecure Xml Parser
Path: pygoat/introduction/views.py, line 163
Info: xml.dom.pulldom.parseString is considered insecure. Use an analog from the defusedxml package.
✗ [Medium] Cross-Site Request Forgery (CSRF)
Path: pygoat/introduction/views.py, line 148
Info: CSRF protection is disabled by
django.views.decorators.csrf.csrf_exempt. This allows the attackers to
execute requests on a user's behalf.
✗ [Medium] Cross-Site Request Forgery (CSRF)
Path: pygoat/introduction/views.py, line 159
Info: CSRF protection is disabled by
django.views.decorators.csrf.csrf_exempt. This allows the attackers to
execute requests on a user's behalf.
✗ [Medium] Cross-Site Request Forgery (CSRF)
Path: pygoat/introduction/views.py, line 238
Info: CSRF protection is disabled by
django.views.decorators.csrf.csrf_exempt. This allows the attackers to
execute requests on a user's behalf.
✗ [Medium] Cross-Site Request Forgery (CSRF)
Path: pygoat/introduction/views.py, line 244
Info: CSRF protection is disabled by
django.views.decorators.csrf.csrf_exempt. This allows the attackers to
execute requests on a user's behalf.
✗ [Medium] Cross-Site Request Forgery (CSRF)
Path: pygoat/introduction/views.py, line 300
Info: CSRF protection is disabled by
django.views.decorators.csrf.csrf_exempt. This allows the attackers to
execute requests on a user's behalf.
✗ [Medium] Cross-Site Request Forgery (CSRF)
Path: pygoat/introduction/views.py, line 341
Info: CSRF protection is disabled by
django.views.decorators.csrf.csrf_exempt. This allows the attackers to
execute requests on a user's behalf.
✗ [Medium] Cross-Site Request Forgery (CSRF)
Path: pygoat/introduction/views.py, line 398
Info: CSRF protection is disabled by
django.views.decorators.csrf.csrf_exempt. This allows the attackers to
execute requests on a user's behalf.
✗ [High] Command Injection
Path: pygoat/introduction/views.py, line 312
Info: Unsanitized input from an HTTP parameter flows into
subprocess.check_output, where it is used as a shell command. This may
result in a Command Injection vulnerability.
✗ [High] Cross-site Scripting (XSS)
Path: pygoat/introduction/views.py, line 363
Info: Unsanitized input from cookies flows into
django.http.HttpResponse, where it is used to render an HTML page
returned to the user. This may result in a Cross-Site Scripting attack
(XSS).
✗ [High] Deserialization of Untrusted Data
Path: pygoat/introduction/views.py, line 122
Info: Unsanitized input from cookies flows into pickle.loads, where it
is used to deserialize an object. This may result in an Unsafe
Deserialization vulnerability.
✗ [High] Deserialization of Untrusted Data
Path: pygoat/introduction/views.py, line 407
Info: Unsanitized input from an uploaded file flows into yaml.load,
where it is used to deserialize an object. This may result in an Unsafe
Deserialization vulnerability.
✗ [High] Hardcoded Secret
Path: pygoat/pygoat/settings.py, line 25
Info: Avoid hardcoding values that are meant to be secret. Found a hardcoded string used in here.
✗ [High] SQL Injection
Path: pygoat/introduction/views.py, line 86
Info: Unsanitized input from an HTTP parameter flows into
pygoat.introduction.models.login.objects.raw, where it is used in an SQL
query. This may result in an SQL Injection vulnerability.
✔ Test completed
Organization: krunalshaikh786
Test type: Static code analysis
Project path: pygoat
Summary:
31 Code issues found
6 [High] 9 [Medium] 16 [Low] ```````````````````````````````````````````````````````````````
- i am getting syntax error because of *✗
- So,
the scenario is on the my Wazuh Agent's machine i installed snyk CLI
and attache it with my snyk account and clone my project in that machine
and run the snyk code test on it and get the scan output
My main Goal is to take all the logs of snyk to wazuh.
How can i fix this problem can you please help me.