Medium
Showing all detectors for the JavaScript language with medium severity.
The software does not restrict or incorrectly restrict access to a resource from an unauthorized actor.
Encryption that is dependent on conditional logic, such as an if...then
clause, might cause unencrypted sensitive data to be stored.
Using pseudorandom number generators (PRNGs) is security-sensitive.
An integer overflow might cause security issues when it is used for resource management or execution control.
Use of new Function()
can be dangerous if used to evaluate dynamic content.
Stack traces can be hard to use for debugging.
Do not bind the SNS Publish operation with the SNS Subscribe or Create Topic operation.
Hardcoding an IP address can cause security problems.
A batch request that doesn't check for failed items can lead to loss of data.
The elevated privilege level should be dropped immediately after the operation is performed.
Allocated resources are not released properly.
An object attribute constructed from a user-provided input should not be passed directly to a method.
Checks if the extension of a file uploaded by a user is validated before the file is saved.
To always return the subscription ARN, set the ReturnSubscriptionArn
argument to True
.
Allowing hidden files while serving files from a given root directory can cause information leakage.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.
Recreating AWS clients in each Lambda function invocation is expensive.
Failing to set the AuthenticateOnUnsubscribe
flag to True
when confirming an SNS subscription can lead to unauthenticated cancellations.
Missing pagination on a paginated call can lead to inaccurate results.
Improper filtering of Amazon Machine Images (AMIs) can result in loading an untrusted image, which is a potential security vulnerability.
Cross-origin resource sharing policies that are too permissive could lead to security vulnerabilities.
A batch request that doesn't check for failed records can lead to loss of data.
Swallowing exceptions, without rethrowing or logging them, can make it hard to understand why your application is failing.
Overriding environment variables that are reserved by AWS Lambda might lead to unexpected behavior.
Updating object attributes obtained from external sources is security sensitive.
Checks if nan is used is comparison.
Improper input validation can enable attacks and lead to unwanted behavior.
Insecure ways of creating temporary files and directories can lead to race conditions, privilege escalation, and other security vulnerabilities.