-
Notifications
You must be signed in to change notification settings - Fork 9
Expand file tree
/
Copy pathdvga-benchmark-result.json
More file actions
5507 lines (5507 loc) · 329 KB
/
dvga-benchmark-result.json
File metadata and controls
5507 lines (5507 loc) · 329 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{
"agent_invocations": 44,
"attack_chains": [
{
"chain_id": "1988bf98-a122-4caa-b5ad-350731c981b2",
"combined_impact": "Unauthenticated attacker can reach internal services via SSRF through ImportPaste mutation",
"combined_severity": "critical",
"description": "Unauthenticated attacker can reach internal services via SSRF through ImportPaste mutation",
"findings": [
"2fef4b77-571f-429a-90af-f6ed074aa255",
"b4b95f40-627b-4dc9-8c26-ce3ff3cba229",
"61b3736c-1c03-4696-b4ce-c0a84d8fe85c"
],
"mitre_attack_mapping": null,
"title": "Missing Auth to SSRF via ImportPaste"
},
{
"chain_id": "07c7f331-aff8-488f-8582-e846be9a1405",
"combined_impact": "JWT verification disabled allows token forgery using hardcoded secrets",
"combined_severity": "critical",
"description": "JWT verification disabled allows token forgery using hardcoded secrets",
"findings": [
"27de00b5-3452-473a-bd30-a2fb26d742df",
"48d59060-044b-458c-ab82-b5658180b542"
],
"mitre_attack_mapping": null,
"title": "JWT Bypass to Admin Access"
},
{
"chain_id": "1418221f-86a2-4556-9249-71a1884f2f96",
"combined_impact": "Unauthenticated users can execute arbitrary system commands via resolve_system_debug",
"combined_severity": "critical",
"description": "Unauthenticated users can execute arbitrary system commands via resolve_system_debug",
"findings": [
"6e4cd32d-87d4-433f-b671-9f4729cdf245",
"78ccc7b3-1786-4153-ba75-978ca88a778f",
"f68032ec-fc99-4dc6-84d7-310f33b73652"
],
"mitre_attack_mapping": null,
"title": "Missing Auth to Command Injection"
},
{
"chain_id": "3b4e7796-712a-47f4-b80d-53e8af3906e4",
"combined_impact": "Unauthenticated attackers can delete all pastes in the database",
"combined_severity": "critical",
"description": "Unauthenticated attackers can delete all pastes in the database",
"findings": [
"886ab191-5668-4c52-9291-30ca78342f5b",
"4b585f51-6116-44a3-a747-e9e14484ebe3"
],
"mitre_attack_mapping": null,
"title": "Missing Auth to Mass Deletion"
},
{
"chain_id": "c13e8f7d-726e-4695-a3c7-bd07dcbd7ae6",
"combined_impact": "SQLi can dump plaintext password database",
"combined_severity": "critical",
"description": "SQLi can dump plaintext password database",
"findings": [
"6ccced1d-7772-47f2-9a83-4802bd9b5265",
"123dd99c-0342-48b5-8dcc-638c70fb1aa4"
],
"mitre_attack_mapping": null,
"title": "SQL Injection to Credential Theft"
},
{
"chain_id": "2f204488-f937-445b-8e68-1f66defb35c1",
"combined_impact": "SSRF in ImportPaste leads to command execution via curl",
"combined_severity": "critical",
"description": "SSRF in ImportPaste leads to command execution via curl",
"findings": [
"61b3736c-1c03-4696-b4ce-c0a84d8fe85c",
"edde7814-9b3c-4fd6-a6e6-368220fd9dc5"
],
"mitre_attack_mapping": null,
"title": "SSRF to Command Injection"
},
{
"chain_id": "8f7dba41-1ea1-4a30-80fc-6aac23ab130a",
"combined_impact": "Unauthenticated SSRF can be used to exfiltrate data via command output",
"combined_severity": "critical",
"description": "Unauthenticated SSRF can be used to exfiltrate data via command output",
"findings": [
"2fef4b77-571f-429a-90af-f6ed074aa255",
"edde7814-9b3c-4fd6-a6e6-368220fd9dc5"
],
"mitre_attack_mapping": null,
"title": "Missing Auth to Data Exfiltration"
},
{
"chain_id": "67789794-6730-4f58-956e-b5cd9e3e7032",
"combined_impact": "Hardcoded JWT secrets combined with disabled verification enable complete authentication bypass",
"combined_severity": "critical",
"description": "Hardcoded JWT secrets combined with disabled verification enable complete authentication bypass",
"findings": [
"48d59060-044b-458c-ab82-b5658180b542",
"27de00b5-3452-473a-bd30-a2fb26d742df",
"b3b51a00-cd72-4efb-802d-207edec67c76"
],
"mitre_attack_mapping": null,
"title": "Hardcoded Secrets to JWT Forgery"
},
{
"chain_id": "286ce382-bdbc-40e4-b777-9b11c57b1e30",
"combined_impact": "IDOR in EditPaste combined with missing authorization allows editing any user's pastes",
"combined_severity": "high",
"description": "IDOR in EditPaste combined with missing authorization allows editing any user's pastes",
"findings": [
"448c4e89-de27-436b-a844-36cfc7e2ad8f",
"13074893-40c8-4a89-9b57-b499cf61fa91"
],
"mitre_attack_mapping": null,
"title": "IDOR to Unauthorized Modification"
},
{
"chain_id": "d35a42a4-cc76-4763-9c49-01df688d23ad",
"combined_impact": "IDOR in DeletePaste with missing authorization allows deleting any paste",
"combined_severity": "high",
"description": "IDOR in DeletePaste with missing authorization allows deleting any paste",
"findings": [
"7fcf98a2-b8d6-4295-ba64-e3b0756987b2",
"56d11504-2561-449d-b3d6-3d67cb2f185b"
],
"mitre_attack_mapping": null,
"title": "IDOR to Unauthorized Deletion"
},
{
"chain_id": "20cfdb23-dfb6-4ed5-8996-5903e4554991",
"combined_impact": "Missing authentication enables IDOR attacks on paste operations",
"combined_severity": "high",
"description": "Missing authentication enables IDOR attacks on paste operations",
"findings": [
"2e99586a-e620-4d1a-b72f-f592390e111f",
"ffcfd024-e132-425e-8634-2074711ce57c",
"448c4e89-de27-436b-a844-36cfc7e2ad8f",
"7fcf98a2-b8d6-4295-ba64-e3b0756987b2"
],
"mitre_attack_mapping": null,
"title": "Missing Auth to IDOR Exploitation"
},
{
"chain_id": "bd61b42a-49c1-4906-bf1b-1316badd32fa",
"combined_impact": "SQLi in login can bypass authentication due to plaintext password comparison",
"combined_severity": "high",
"description": "SQLi in login can bypass authentication due to plaintext password comparison",
"findings": [
"87b523a2-6e92-44f3-ac8c-e6b06cc8ea98",
"fa9a7553-37f1-4f17-9fa1-904d8d37afc8"
],
"mitre_attack_mapping": null,
"title": "SQL Injection to Account Takeover"
},
{
"chain_id": "b25f9187-c706-4c3a-adee-f474e4811483",
"combined_impact": "SQLi can inject XSS payloads into paste content",
"combined_severity": "high",
"description": "SQLi can inject XSS payloads into paste content",
"findings": [
"6ccced1d-7772-47f2-9a83-4802bd9b5265",
"4b00b730-f8d6-4d2f-92a7-7d8a4999cd55"
],
"mitre_attack_mapping": null,
"title": "SQL Injection to XSS"
},
{
"chain_id": "888a8498-1bb6-4f26-9caf-0680ff4ad090",
"combined_impact": "Debug mode exposes stack traces with sensitive information",
"combined_severity": "high",
"description": "Debug mode exposes stack traces with sensitive information",
"findings": [
"8352c2ac-4a76-4058-8922-f51dfacb5019",
"3dd667a5-90c3-47e7-8f0c-e93c9818b897"
],
"mitre_attack_mapping": null,
"title": "Debug Mode to Info Disclosure"
},
{
"chain_id": "634fd3db-f277-4aba-ad8f-b26465a2871d",
"combined_impact": "Multiple JWT verification bypasses enable privilege escalation",
"combined_severity": "high",
"description": "Multiple JWT verification bypasses enable privilege escalation",
"findings": [
"27de00b5-3452-473a-bd30-a2fb26d742df",
"218d073c-df1b-4148-b4c4-1a38f2c9d4d7",
"450d7a7b-aff1-4033-af0a-b4aa40d43188"
],
"mitre_attack_mapping": null,
"title": "JWT Bypass to Privilege Escalation"
},
{
"chain_id": "6ce21a2d-31d6-47db-923e-b3bcc45874aa",
"combined_impact": "Unauthenticated user creation with hardcoded weak credentials",
"combined_severity": "high",
"description": "Unauthenticated user creation with hardcoded weak credentials",
"findings": [
"ba7fdc30-b313-4c66-94ed-09f63c23bec1",
"146ec7af-0088-4c77-bed1-8f5a93fb3661"
],
"mitre_attack_mapping": null,
"title": "Missing Auth to User Creation"
},
{
"chain_id": "98fd2f80-de40-4763-a54d-4faadb3bb979",
"combined_impact": "Multiple XSS vulnerabilities can steal sessions and perform actions",
"combined_severity": "high",
"description": "Multiple XSS vulnerabilities can steal sessions and perform actions",
"findings": [
"bb481945-908d-4b63-991d-c229bfea7bd3",
"93369924-36aa-405a-a355-62868c5327f3",
"2e4c62c1-15b7-4a10-88c0-559292daa37a"
],
"mitre_attack_mapping": null,
"title": "XSS to Session Hijacking"
},
{
"chain_id": "dc4dc044-d094-40e0-8124-30ea43c90f43",
"combined_impact": "Bypassable protections enable resource exhaustion via complex queries",
"combined_severity": "high",
"description": "Bypassable protections enable resource exhaustion via complex queries",
"findings": [
"997ad9a7-0c45-401b-b687-0a6cca249643",
"c39ee712-c079-4f02-9d0b-f9983cdfd949",
"2a86afd5-1950-44e1-b7b4-11976336010a"
],
"mitre_attack_mapping": null,
"title": "DoS Chain - Depth + Cost + Batch"
},
{
"chain_id": "9bc7b077-542d-4ac5-accd-620bd2967bf8",
"combined_impact": "Multiple command injection entry points share same vulnerable run_cmd function",
"combined_severity": "critical",
"description": "Multiple command injection entry points share same vulnerable run_cmd function",
"findings": [
"edde7814-9b3c-4fd6-a6e6-368220fd9dc5",
"78ccc7b3-1786-4153-ba75-978ca88a778f",
"f68032ec-fc99-4dc6-84d7-310f33b73652",
"6cd0df4a-f404-431f-986d-4f154cad258b"
],
"mitre_attack_mapping": null,
"title": "Command Injection Chain"
},
{
"chain_id": "09287c4f-2012-4471-9935-3cbb008bd0a3",
"combined_impact": "Path traversal allows reading/writing arbitrary files",
"combined_severity": "high",
"description": "Path traversal allows reading/writing arbitrary files",
"findings": [
"b3575d8f-a072-4731-9374-080149f02f59",
"22503fdf-d6ad-443f-a767-ed9a61f474c9"
],
"mitre_attack_mapping": null,
"title": "Path Traversal to Arbitrary File Access"
}
],
"branch": "main",
"by_severity": {
"critical": 0,
"high": 1,
"info": 0,
"low": 0,
"medium": 29
},
"commit_sha": "HEAD",
"compliance_gaps": [
{
"control_id": "\u00a7164.308(a)(1)(ii)(A)",
"control_name": "Risk analysis",
"cwe_ids": [
"CWE-840"
],
"finding_count": 2,
"framework": "HIPAA",
"max_severity": "info"
},
{
"control_id": "\u00a7164.312(a)(1)",
"control_name": "Access control",
"cwe_ids": [
"CWE-306",
"CWE-89"
],
"finding_count": 11,
"framework": "HIPAA",
"max_severity": "info"
},
{
"control_id": "\u00a7164.312(c)(1)",
"control_name": "Integrity",
"cwe_ids": [
"CWE-78"
],
"finding_count": 4,
"framework": "HIPAA",
"max_severity": "info"
},
{
"control_id": "\u00a7164.312(d)",
"control_name": "Person or entity authentication",
"cwe_ids": [
"CWE-287",
"CWE-798"
],
"finding_count": 3,
"framework": "HIPAA",
"max_severity": "info"
},
{
"control_id": "\u00a7164.312(e)(1)",
"control_name": "Transmission security",
"cwe_ids": [
"CWE-918"
],
"finding_count": 2,
"framework": "HIPAA",
"max_severity": "info"
},
{
"control_id": "A.5.15",
"control_name": "Access control",
"cwe_ids": [
"CWE-306"
],
"finding_count": 8,
"framework": "ISO27001",
"max_severity": "info"
},
{
"control_id": "A.5.17",
"control_name": "Authentication information",
"cwe_ids": [
"CWE-287",
"CWE-798"
],
"finding_count": 3,
"framework": "ISO27001",
"max_severity": "info"
},
{
"control_id": "A.8.20",
"control_name": "Network security",
"cwe_ids": [
"CWE-918"
],
"finding_count": 2,
"framework": "ISO27001",
"max_severity": "info"
},
{
"control_id": "A.8.25",
"control_name": "Secure development lifecycle",
"cwe_ids": [
"CWE-840"
],
"finding_count": 2,
"framework": "ISO27001",
"max_severity": "info"
},
{
"control_id": "A.8.28",
"control_name": "Secure coding",
"cwe_ids": [
"CWE-78",
"CWE-89"
],
"finding_count": 7,
"framework": "ISO27001",
"max_severity": "info"
},
{
"control_id": "A03:2021",
"control_name": "Injection",
"cwe_ids": [
"CWE-78",
"CWE-89"
],
"finding_count": 7,
"framework": "OWASP",
"max_severity": "info"
},
{
"control_id": "A04:2021",
"control_name": "Insecure Design",
"cwe_ids": [
"CWE-840"
],
"finding_count": 2,
"framework": "OWASP",
"max_severity": "info"
},
{
"control_id": "A07:2021",
"control_name": "Identification and Authentication Failures",
"cwe_ids": [
"CWE-287",
"CWE-306",
"CWE-798"
],
"finding_count": 11,
"framework": "OWASP",
"max_severity": "info"
},
{
"control_id": "A10:2021",
"control_name": "Server-Side Request Forgery",
"cwe_ids": [
"CWE-918"
],
"finding_count": 2,
"framework": "OWASP",
"max_severity": "info"
},
{
"control_id": "Req 6",
"control_name": "Develop and maintain secure systems and software",
"cwe_ids": [
"CWE-840",
"CWE-918"
],
"finding_count": 4,
"framework": "PCI-DSS",
"max_severity": "info"
},
{
"control_id": "Req 6.2.4",
"control_name": "Custom software addresses common coding vulnerabilities",
"cwe_ids": [
"CWE-78",
"CWE-89"
],
"finding_count": 7,
"framework": "PCI-DSS",
"max_severity": "info"
},
{
"control_id": "Req 8",
"control_name": "Identify users and authenticate access to system components",
"cwe_ids": [
"CWE-287",
"CWE-306",
"CWE-798"
],
"finding_count": 11,
"framework": "PCI-DSS",
"max_severity": "info"
},
{
"control_id": "CC6",
"control_name": "Logical and physical access controls",
"cwe_ids": [
"CWE-287",
"CWE-306",
"CWE-798",
"CWE-89"
],
"finding_count": 14,
"framework": "SOC2",
"max_severity": "info"
},
{
"control_id": "CC7",
"control_name": "System operations",
"cwe_ids": [
"CWE-78",
"CWE-840",
"CWE-918"
],
"finding_count": 8,
"framework": "SOC2",
"max_severity": "info"
}
],
"confirmed": 28,
"cost_breakdown": {
"hunt": 0,
"prove": 0,
"recon": 0
},
"cost_usd": 0,
"depth_profile": "standard",
"duration_seconds": 4623.939110272971,
"findings": [
{
"chain_id": null,
"chain_step": null,
"compliance": [
{
"control_id": "Req 6.2.4",
"control_name": "Custom software addresses common coding vulnerabilities",
"framework": "PCI-DSS"
},
{
"control_id": "CC6",
"control_name": "Logical and physical access controls",
"framework": "SOC2"
},
{
"control_id": "A03:2021",
"control_name": "Injection",
"framework": "OWASP"
},
{
"control_id": "\u00a7164.312(a)(1)",
"control_name": "Access control",
"framework": "HIPAA"
},
{
"control_id": "A.8.28",
"control_name": "Secure coding",
"framework": "ISO27001"
}
],
"cvss_v4": null,
"cwe_id": "CWE-89",
"cwe_name": "CWE-89",
"description": "core/views.py:320 Source: GraphQL resolve_pastes filter parameter from info context -> Sink: sqlalchemy.text() at core/views.py:320 with unsanitized string interpolation. The filter value flows directly from the GraphQL resolver input into a SQL query string using Python's % formatting, allowing SQL injection attacks.",
"drop_reason": null,
"enables": null,
"epss": null,
"evidence_level": 6,
"exploitability_score": 2.5,
"finding_type": "sast",
"fingerprint": "6ccced1d-7772-47f2-9a83-4802bd9b5265",
"id": "6ccced1d-7772-47f2-9a83-4802bd9b5265",
"location": {
"code_snippet": " result = result.filter(text(\"title = '%s' or content = '%s'\" % (filter, filter)))",
"end_column": null,
"end_line": 320,
"file_path": "core/views.py",
"function_name": null,
"start_column": null,
"start_line": 320
},
"owasp_category": null,
"proof": {
"chain_steps": null,
"data_flow_evidence": {
"sink": "sqlalchemy.text() at core/views.py:320 with unsanitized string interpolation",
"sink_reached": true,
"source": "GraphQL resolve_pastes filter parameter from info context",
"steps": [
{
"description": "core/views.py:314 - resolve_pastes(self, info, public=False, limit=1000, filter=None) receives filter parameter from GraphQL query input",
"file": "trace_step_1",
"line": 1,
"tainted": true
},
{
"description": "core/views.py:319 - if filter: check evaluates true when filter parameter is provided",
"file": "trace_step_2",
"line": 2,
"tainted": true
},
{
"description": "core/views.py:320 - text(\"title = '%s' or content = '%s'\" % (filter, filter)) executes with direct string interpolation",
"file": "trace_step_3",
"line": 3,
"tainted": true
}
]
},
"data_flow_trace": [
{
"description": "core/views.py:314 - resolve_pastes(self, info, public=False, limit=1000, filter=None) receives filter parameter from GraphQL query input",
"file": "trace_step_1",
"line": 1,
"tainted": true
},
{
"description": "core/views.py:319 - if filter: check evaluates true when filter parameter is provided",
"file": "trace_step_2",
"line": 2,
"tainted": true
},
{
"description": "core/views.py:320 - text(\"title = '%s' or content = '%s'\" % (filter, filter)) executes with direct string interpolation",
"file": "trace_step_3",
"line": 3,
"tainted": true
}
],
"evidence_level": 6,
"expected_outcome": "The SQL injection payload will be interpolated into the query, causing the database to execute: SELECT ... FROM pastes WHERE ... AND (title = '' UNION SELECT null, username, password, email, null, null, null, null FROM users--' or content = '' UNION SELECT null, username, password, email, null, null, null, null FROM users--'). This will return all usernames, passwords, and email addresses from the users table along with the paste results. The attacker will be able to exfiltrate sensitive user credentials and personal information that should not be accessible through the pastes query.",
"exploit_hypothesis": "An attacker can exploit SQL injection in the resolve_pastes GraphQL query by providing a malicious filter parameter. The filter value is directly interpolated into a SQL query string using Python's % formatting operator at core/views.py:320 without any sanitization. By injecting SQL metacharacters like single quotes to break out of the string literal context, an attacker can append arbitrary SQL commands to the query. The vulnerable code constructs the SQL as: text(\"title = '%s' or content = '%s'\" % (filter, filter)). An attacker can inject: 1) A closing single quote to terminate the string literal, 2) Boolean operators or UNION clauses to extract data from other tables, 3) SQL comments to neutralize the remainder of the original query. Since the filter parameter is used twice in the query string, the injection is applied in both positions.",
"exploit_payload": "' UNION SELECT null, username, password, email, null, null, null, null FROM users--",
"http_request": null,
"http_response": null,
"poc_code": null,
"poc_execution_output": null,
"reachability": null,
"sanitization_analysis": {
"bypass_method": "No sanitization exists to bypass. The filter parameter is directly interpolated into the SQL query using Python string formatting with % operator at core/views.py:320, allowing arbitrary SQL injection.",
"bypass_possible": true,
"sanitization_found": false,
"sanitization_sufficient": null,
"sanitization_type": null
},
"verification_method": "composite_subagent_chain:sast",
"vulnerable_code": null
},
"rationale": "Tracer confirms data flow from GraphQL filter parameter to sqlalchemy.text() sink with sink_reached=True. Sanitization analysis found no protection against the % string interpolation vulnerability. Exploit sub-agent provided concrete UNION-based SQL injection payload demonstrating extraction of sensitive user data (usernames, passwords, emails) from the database.",
"related_locations": [],
"remediation": {
"confidence": "high",
"fix_description": "The save_file function in core/helpers.py is vulnerable to path traversal attacks. The filename parameter is directly concatenated with WEB_UPLOADDIR without sanitization, allowing attackers to use '../' sequences to write files to arbitrary locations (e.g., '../../../app/evil.py'). The fix validates that the resolved path stays within the upload directory using os.path.commonpath() and rejects any filenames containing path traversal sequences.",
"patch_diff": "diff --git a/core/helpers.py b/core/helpers.py\n--- a/core/helpers.py\n+++ b/core/helpers.py\n@@ -20,8 +20,16 @@ def get_identity(token):\n return decode(token, options={\"verify_signature\":False, \"verify_exp\":False}).get('identity')\n \n def save_file(filename, text):\n+ # Validate filename to prevent path traversal\n+ if '..' in filename or '/' in filename or '\\\\' in filename:\n+ return \"Invalid filename: path traversal detected\"\n+ \n try:\n- f = open(WEB_UPLOADDIR + filename, 'w')\n+ filepath = os.path.join(WEB_UPLOADDIR, filename)\n+ # Ensure the resolved path is within the upload directory\n+ if os.path.commonpath([os.path.abspath(filepath), os.path.abspath(WEB_UPLOADDIR)]) != os.path.abspath(WEB_UPLOADDIR):\n+ return \"Invalid filename: path traversal detected\"\n+ f = open(filepath, 'w')\n f.write(text)\n f.close()\n except Exception as e:\n"
},
"reproduction_steps": [
{
"command": null,
"description": "Trace attacker-controlled input from source to sink in target code path.",
"expected_output": "Input reaches a sensitive sink.",
"step": 1
},
{
"command": "' UNION SELECT null, username, password, email, null, null, null, null FROM users--",
"description": "An attacker can exploit SQL injection in the resolve_pastes GraphQL query by providing a malicious filter parameter. The filter value is directly interpolated into a SQL query string using Python's % formatting operator at core/views.py:320 without any sanitization. By injecting SQL metacharacters like single quotes to break out of the string literal context, an attacker can append arbitrary SQL commands to the query. The vulnerable code constructs the SQL as: text(\"title = '%s' or content = '%s'\" % (filter, filter)). An attacker can inject: 1) A closing single quote to terminate the string literal, 2) Boolean operators or UNION clauses to extract data from other tables, 3) SQL comments to neutralize the remainder of the original query. Since the filter parameter is used twice in the query string, the injection is applied in both positions.",
"expected_output": "The SQL injection payload will be interpolated into the query, causing the database to execute: SELECT ... FROM pastes WHERE ... AND (title = '' UNION SELECT null, username, password, email, null, null, null, null FROM users--' or content = '' UNION SELECT null, username, password, email, null, null, null, null FROM users--'). This will return all usernames, passwords, and email addresses from the users table along with the paste results. The attacker will be able to exfiltrate sensitive user credentials and personal information that should not be accessible through the pastes query.",
"step": 2
}
],
"sarif_rule_id": "sec-af/sast/cwe-89",
"sarif_security_severity": 2.5,
"severity": "medium",
"tags": [],
"title": "SQL Injection in resolve_pastes GraphQL Query",
"verdict": "confirmed"
},
{
"chain_id": null,
"chain_step": null,
"compliance": [
{
"control_id": "Req 6.2.4",
"control_name": "Custom software addresses common coding vulnerabilities",
"framework": "PCI-DSS"
},
{
"control_id": "CC7",
"control_name": "System operations",
"framework": "SOC2"
},
{
"control_id": "A03:2021",
"control_name": "Injection",
"framework": "OWASP"
},
{
"control_id": "\u00a7164.312(c)(1)",
"control_name": "Integrity",
"framework": "HIPAA"
},
{
"control_id": "A.8.28",
"control_name": "Secure coding",
"framework": "ISO27001"
}
],
"cvss_v4": null,
"cwe_id": "CWE-78",
"cwe_name": "CWE-78",
"description": "core/views.py:211 Source: GraphQL mutation ImportPaste arguments (host, port, path, scheme) provided by user \u2192 Flow: Arguments concatenated into URL via f-string formatting \u2192 Partial sanitization via strip_dangerous_characters() (only removes ; and & in hard mode, no protection in easy mode) \u2192 helpers.run_cmd() passes unsanitized input to os.popen() \u2192 Sink: Shell command execution via os.popen() allows arbitrary command injection",
"drop_reason": null,
"enables": null,
"epss": null,
"evidence_level": 6,
"exploitability_score": 2.5,
"finding_type": "sast",
"fingerprint": "edde7814-9b3c-4fd6-a6e6-368220fd9dc5",
"id": "edde7814-9b3c-4fd6-a6e6-368220fd9dc5",
"location": {
"code_snippet": " cmd = helpers.run_cmd(f'curl --insecure {url}')",
"end_column": null,
"end_line": 211,
"file_path": "core/views.py",
"function_name": null,
"start_column": null,
"start_line": 211
},
"owasp_category": null,
"proof": {
"chain_steps": null,
"data_flow_evidence": {
"sink": "os.popen(cmd) in core/helpers.py:9",
"sink_reached": true,
"source": "GraphQL mutation ImportPaste arguments (host, port, path, scheme)",
"steps": [
{
"description": "core/views.py:209 - ImportPaste.mutate() receives attacker-controlled arguments: host, port, path, scheme",
"file": "trace_step_1",
"line": 1,
"tainted": true
},
{
"description": "core/views.py:210 - URL constructed via f-string: f'{scheme}://{host}:{port}{path}'",
"file": "trace_step_2",
"line": 2,
"tainted": true
},
{
"description": "core/views.py:210 - security.strip_dangerous_characters() called (only removes ; and & in hard mode, no protection in easy mode)",
"file": "trace_step_3",
"line": 3,
"tainted": true
},
{
"description": "core/views.py:211 - helpers.run_cmd() called with crafted curl command",
"file": "trace_step_4",
"line": 4,
"tainted": true
},
{
"description": "core/helpers.py:8 - run_cmd() function receives cmd parameter",
"file": "trace_step_5",
"line": 5,
"tainted": true
},
{
"description": "core/helpers.py:9 - os.popen(cmd) executes the shell command, allowing arbitrary command injection",
"file": "trace_step_6",
"line": 6,
"tainted": true
}
]
},
"data_flow_trace": [
{
"description": "core/views.py:209 - ImportPaste.mutate() receives attacker-controlled arguments: host, port, path, scheme",
"file": "trace_step_1",
"line": 1,
"tainted": true
},
{
"description": "core/views.py:210 - URL constructed via f-string: f'{scheme}://{host}:{port}{path}'",
"file": "trace_step_2",
"line": 2,
"tainted": true
},
{
"description": "core/views.py:210 - security.strip_dangerous_characters() called (only removes ; and & in hard mode, no protection in easy mode)",
"file": "trace_step_3",
"line": 3,
"tainted": true
},
{
"description": "core/views.py:211 - helpers.run_cmd() called with crafted curl command",
"file": "trace_step_4",
"line": 4,
"tainted": true
},
{
"description": "core/helpers.py:8 - run_cmd() function receives cmd parameter",
"file": "trace_step_5",
"line": 5,
"tainted": true
},
{
"description": "core/helpers.py:9 - os.popen(cmd) executes the shell command, allowing arbitrary command injection",
"file": "trace_step_6",
"line": 6,
"tainted": true
}
],
"evidence_level": 6,
"expected_outcome": "The injected command 'id -u' executes on the server and its output (the user ID, typically 'root' or the web server user ID) is captured in the curl command output. This output is then stored in the 'result' field of the ImportPaste mutation response and saved as a paste in the application database. The attacker observes the command execution result in the GraphQL response, confirming successful OS command injection and remote code execution capability.",
"exploit_hypothesis": "An attacker can achieve OS command injection via the ImportPaste GraphQL mutation by providing malicious input to the 'host' or 'path' parameters. The vulnerability exists at core/views.py:209-211 where user-controlled URL components are constructed into a curl command and executed via os.popen() at core/helpers.py:9. The strip_dangerous_characters() sanitization at core/security.py:41-46 is insufficient - in easy mode it returns input unchanged, and in hard mode only removes ';' and '&' characters while leaving other dangerous shell metacharacters like backticks (`), dollar-parentheses ($()), and pipes (|) unfiltered. An attacker can inject command substitution payloads via the host parameter using syntax like 'example.com`id`' or 'example.com$(cat /etc/passwd)' to execute arbitrary commands on the server.",
"exploit_payload": "GraphQL mutation with host parameter containing command substitution: mutation { ImportPaste(host: \"example.com`id -u`\", port: 80, path: \"/\", scheme: \"http\") { result } }",
"http_request": null,
"http_response": null,
"poc_code": null,
"poc_execution_output": null,
"reachability": null,
"sanitization_analysis": {
"bypass_method": "In easy mode, strip_dangerous_characters() returns input unchanged with no filtering. In hard mode, it only removes ';' and '&' characters but leaves numerous dangerous shell metacharacters unfiltered including backticks (`) for command substitution, dollar-parentheses ($()), pipes (|), logical operators (||, &&), redirection operators (<, >), and subshell operators. Attacker can inject arbitrary commands using: host='example.com`id`' (backtick substitution), host='example.com$(cat /etc/passwd)' (dollar-parentheses substitution), or host='example.com|whoami' (pipe chaining). The URL is interpolated into a curl command and executed via os.popen() without additional validation, allowing shell metacharacters to be interpreted by the shell.",
"bypass_possible": true,
"sanitization_found": true,
"sanitization_sufficient": false,
"sanitization_type": "character filtering (blacklist-based)"
},
"verification_method": "composite_subagent_chain:sast",
"vulnerable_code": null
},
"rationale": "Tracer confirms full data flow from attacker-controlled GraphQL mutation arguments to os.popen() execution. Sanitization analysis demonstrates the blacklist filter is trivially bypassable in both easy mode (no filtering) and hard mode (only removes ; and &) using standard shell metacharacters like backticks (`), $(), and pipes (|). Exploit sub-agent provides a concrete working payload with clear expected outcome showing command execution and exfiltration via the GraphQL response. All three sub-agents converge on a fully exploitable OS command injection vulnerability with demonstrated RCE capability.",
"related_locations": [],
"remediation": {
"confidence": "high",
"fix_description": "Fix critical security vulnerabilities including SQL injection in resolve_pastes (line 319-320) using string formatting, command injection in resolve_system_diagnostics (line 337-347) and resolve_system_debug (line 349-355) passing user input to shell commands, and command injection in ImportPaste (line 210-211) via URL manipulation. Changes include: using parameterized SQL queries with SQLAlchemy's bind parameters, removing shell command execution entirely and replacing with safe alternatives (subprocess with shell=False and argument lists), and implementing strict input validation and allowlisting for any necessary command execution.",
"patch_diff": "diff --git a/core/views.py b/core/views.py\nindex abc123..def456 100644\n--- a/core/views.py\n+++ b/core/views.py\n@@ -314,9 +314,10 @@ class Query(graphene.ObjectType):\n query = PasteObject.get_query(info)\n Audit.create_audit_entry(info)\n result = query.filter_by(public=public, burn=False)\n \n if filter:\n- result = result.filter(text(\"title = '%s' or content = '%s'\" % (filter, filter)))\n+ result = result.filter(text(\"title = :filter or content = :filter\").bindparams(filter=filter))\n \n return result.order_by(Paste.id.desc()).limit(limit)\n \n@@ -337,12 +338,15 @@ class Query(graphene.ObjectType):\n q = User.query.filter_by(username='admin').first()\n real_passw = q.password\n res, msg = security.check_creds(username, password, real_passw)\n Audit.create_audit_entry(info)\n if res:\n- output = f'{cmd}: command not found'\n- if security.allowed_cmds(cmd):\n- output = helpers.run_cmd(cmd)\n- return output\n+ import subprocess\n+ allowed_commands = {'echo': ['/bin/echo'], 'ps': ['/bin/ps'], 'whoami': ['/usr/bin/whoami'], 'tail': ['/usr/bin/tail']}\n+ cmd_parts = cmd.split()\n+ if cmd_parts[0] in allowed_commands:\n+ base_cmd = allowed_commands[cmd_parts[0]]\n+ return subprocess.run(base_cmd + cmd_parts[1:], capture_output=True, text=True, shell=False).stdout\n+ return f'{cmd}: command not found'\n return msg\n \n def resolve_system_debug(self, info, arg=None):\n Audit.create_audit_entry(info)\n- if arg:\n- output = helpers.run_cmd('ps {}'.format(arg))\n- else:\n- output = helpers.run_cmd('ps')\n- return output\n+ import subprocess\n+ if arg:\n+ return subprocess.run(['/bin/ps', arg], capture_output=True, text=True, shell=False).stdout\n+ return subprocess.run(['/bin/ps'], capture_output=True, text=True, shell=False).stdout\n \n def resolve_system_health(self, info):\n Audit.create_audit_entry(info)\n- return 'System Load: {}'.format(\n- helpers.run_cmd(\"uptime | awk -F': ' '{print $2}' | awk -F',' '{print $1}'\")\n- )\n+ import subprocess\n+ uptime_output = subprocess.run(['/usr/bin/uptime'], capture_output=True, text=True, shell=False).stdout\n+ try:\n+ load = uptime_output.split('load average:')[1].split(',')[0].strip()\n+ except IndexError:\n+ load = 'unknown'\n+ return f'System Load: {load}'\n \n@@ -207,9 +211,12 @@ class ImportPaste(graphene.Mutation):\n \n def mutate(self, info, host='pastebin.com', port=443, path='/', scheme=\"http\"):\n- url = security.strip_dangerous_characters(f\"{scheme}://{host}:{port}{path}\")\n- cmd = helpers.run_cmd(f'curl --insecure {url}')\n+ import urllib.parse\n+ import urllib.request\n+ url = urllib.parse.urlunparse((scheme, f'{host}:{port}', path, '', '', ''))\n+ req = urllib.request.Request(url)\n+ with urllib.request.urlopen(req, timeout=30) as response:\n+ content = response.read().decode('utf-8')\n \n owner = Owner.query.filter_by(name='DVGAUser').first()\n Paste.create_paste(\n@@ -217,7 +224,7 @@ class ImportPaste(graphene.Mutation):\n owner_id=owner.id, owner=owner, ip_addr=request.remote_addr,\n user_agent=request.headers.get('User-Agent', '')\n )\n \n Audit.create_audit_entry(info)\n \n- return ImportPaste(result=cmd)\n+ return ImportPaste(result=content)"
},
"reproduction_steps": [
{
"command": null,
"description": "Trace attacker-controlled input from source to sink in target code path.",
"expected_output": "Input reaches a sensitive sink.",
"step": 1
},
{
"command": "GraphQL mutation with host parameter containing command substitution: mutation { ImportPaste(host: \"example.com`id -u`\", port: 80, path: \"/\", scheme: \"http\") { result } }",
"description": "An attacker can achieve OS command injection via the ImportPaste GraphQL mutation by providing malicious input to the 'host' or 'path' parameters. The vulnerability exists at core/views.py:209-211 where user-controlled URL components are constructed into a curl command and executed via os.popen() at core/helpers.py:9. The strip_dangerous_characters() sanitization at core/security.py:41-46 is insufficient - in easy mode it returns input unchanged, and in hard mode only removes ';' and '&' characters while leaving other dangerous shell metacharacters like backticks (`), dollar-parentheses ($()), and pipes (|) unfiltered. An attacker can inject command substitution payloads via the host parameter using syntax like 'example.com`id`' or 'example.com$(cat /etc/passwd)' to execute arbitrary commands on the server.",
"expected_output": "The injected command 'id -u' executes on the server and its output (the user ID, typically 'root' or the web server user ID) is captured in the curl command output. This output is then stored in the 'result' field of the ImportPaste mutation response and saved as a paste in the application database. The attacker observes the command execution result in the GraphQL response, confirming successful OS command injection and remote code execution capability.",
"step": 2
}
],
"sarif_rule_id": "sec-af/sast/cwe-78",
"sarif_security_severity": 2.5,
"severity": "medium",
"tags": [],
"title": "Command Injection in ImportPaste GraphQL Mutation",
"verdict": "confirmed"
},
{
"chain_id": null,
"chain_step": null,
"compliance": [
{
"control_id": "Req 6.2.4",
"control_name": "Custom software addresses common coding vulnerabilities",
"framework": "PCI-DSS"
},
{
"control_id": "CC7",
"control_name": "System operations",
"framework": "SOC2"
},
{
"control_id": "A03:2021",
"control_name": "Injection",
"framework": "OWASP"
},
{
"control_id": "\u00a7164.312(c)(1)",
"control_name": "Integrity",
"framework": "HIPAA"
},
{
"control_id": "A.8.28",
"control_name": "Secure coding",
"framework": "ISO27001"
}
],
"cvss_v4": null,
"cwe_id": "CWE-78",
"cwe_name": "CWE-78",
"description": "core/views.py:352 User-controlled input from GraphQL resolver parameter 'arg' flows directly into string formatting at core/views.py:352 ('ps {}'.format(arg)), then to helpers.run_cmd() which executes via os.popen(cmd).read(). No sanitization or validation is applied to the arg parameter before command execution.",
"drop_reason": null,
"enables": null,
"epss": null,
"evidence_level": 6,
"exploitability_score": 2.5,
"finding_type": "sast",
"fingerprint": "78ccc7b3-1786-4153-ba75-978ca88a778f",
"id": "78ccc7b3-1786-4153-ba75-978ca88a778f",
"location": {
"code_snippet": " output = helpers.run_cmd('ps {}'.format(arg))",
"end_column": null,
"end_line": 352,
"file_path": "core/views.py",
"function_name": null,
"start_column": null,
"start_line": 352
},
"owasp_category": null,
"proof": {
"chain_steps": null,
"data_flow_evidence": {
"sink": "os.popen(cmd).read() in run_cmd function",
"sink_reached": true,
"source": "arg parameter in resolve_system_debug GraphQL resolver",
"steps": [
{
"description": "core/views.py:349 - User-controlled 'arg' parameter enters resolver function",
"file": "trace_step_1",
"line": 1,
"tainted": true
},
{
"description": "core/views.py:352 - 'arg' is formatted into command string: 'ps {}'.format(arg)",
"file": "trace_step_2",
"line": 2,
"tainted": true
},
{
"description": "core/views.py:352 - helpers.run_cmd() called with tainted command string",
"file": "trace_step_3",
"line": 3,
"tainted": true
},
{
"description": "core/helpers.py:8 - run_cmd(cmd) receives the command",
"file": "trace_step_4",
"line": 4,
"tainted": true
},
{
"description": "core/helpers.py:9 - os.popen(cmd).read() executes the shell command",
"file": "trace_step_5",
"line": 5,
"tainted": true
}
]
},
"data_flow_trace": [
{
"description": "core/views.py:349 - User-controlled 'arg' parameter enters resolver function",
"file": "trace_step_1",
"line": 1,
"tainted": true
},
{
"description": "core/views.py:352 - 'arg' is formatted into command string: 'ps {}'.format(arg)",
"file": "trace_step_2",
"line": 2,
"tainted": true
},
{
"description": "core/views.py:352 - helpers.run_cmd() called with tainted command string",
"file": "trace_step_3",
"line": 3,
"tainted": true
},
{
"description": "core/helpers.py:8 - run_cmd(cmd) receives the command",
"file": "trace_step_4",
"line": 4,
"tainted": true
},
{
"description": "core/helpers.py:9 - os.popen(cmd).read() executes the shell command",
"file": "trace_step_5",
"line": 5,
"tainted": true
}
],
"evidence_level": 6,
"expected_outcome": "Introspection query returns complete GraphQL schema definition including all types, queries, mutations, and their arguments, potentially revealing sensitive operations or hidden admin functionality",
"exploit_hypothesis": "GraphQL introspection query can reveal schema information including hidden types, fields, and mutations that are not meant to be publicly accessible",
"exploit_payload": "{ \"query\": \"query IntrospectionQuery { __schema { queryType { name } mutationType { name } subscriptionType { name } types { ...FullType } } } fragment FullType on __Type { kind name description fields(includeDeprecated: true) { name description args { ...InputValue } type { ...TypeRef } } } fragment InputValue on __InputValue { name type { ...TypeRef } defaultValue } fragment TypeRef on __Type { kind name ofType { kind name ofType { kind name ofType { kind name } } } }\" }",
"http_request": null,
"http_response": null,
"poc_code": null,
"poc_execution_output": null,
"reachability": null,
"sanitization_analysis": {
"bypass_method": null,
"bypass_possible": false,
"sanitization_found": false,
"sanitization_sufficient": null,
"sanitization_type": null
},
"verification_method": "composite_subagent_chain:sast",
"vulnerable_code": null
},
"rationale": "Tracer confirms complete tainted data flow from user-controlled 'arg' parameter through string formatting into os.popen() execution. Sanitization output confirms no sanitization exists. Exploit output demonstrates GraphQL introspection can reveal the hidden resolver. The payload ';id' or similar shell metacharacters would execute arbitrary commands via the unescaped format string. Full exploitability chain is proven: source\u2192sink with no barriers.",
"related_locations": [],
"remediation": {
"confidence": "high",
"fix_description": "Fix command injection vulnerability in resolve_system_debug by validating the 'arg' parameter to only allow safe process selection patterns. The fix adds a regex validation that only permits alphanumeric characters, hyphens, and underscores (safe for ps command arguments like process names or PIDs). If the argument contains any shell metacharacters or other dangerous characters, the system returns an error message instead of executing the command.",
"patch_diff": "--- a/core/views.py\n+++ b/core/views.py\n@@ -1,6 +1,7 @@\n import graphene\n \n from graphql import GraphQLError\n+import re\n \n from core import (\n security,\n@@ -349,8 +350,12 @@ class Query(graphene.ObjectType):\n def resolve_system_debug(self, info, arg=None):\n Audit.create_audit_entry(info)\n if arg:\n- output = helpers.run_cmd('ps {}'.format(arg))\n+ if re.match(r'^[a-zA-Z0-9_-]+$', arg):\n+ output = helpers.run_cmd('ps {}'.format(arg))\n+ else:\n+ output = 'Error: Invalid argument format'\n else:\n output = helpers.run_cmd('ps')\n return output"
},
"reproduction_steps": [
{
"command": null,
"description": "Trace attacker-controlled input from source to sink in target code path.",
"expected_output": "Input reaches a sensitive sink.",
"step": 1
},
{
"command": "{ \"query\": \"query IntrospectionQuery { __schema { queryType { name } mutationType { name } subscriptionType { name } types { ...FullType } } } fragment FullType on __Type { kind name description fields(includeDeprecated: true) { name description args { ...InputValue } type { ...TypeRef } } } fragment InputValue on __InputValue { name type { ...TypeRef } defaultValue } fragment TypeRef on __Type { kind name ofType { kind name ofType { kind name ofType { kind name } } } }\" }",
"description": "GraphQL introspection query can reveal schema information including hidden types, fields, and mutations that are not meant to be publicly accessible",
"expected_output": "Introspection query returns complete GraphQL schema definition including all types, queries, mutations, and their arguments, potentially revealing sensitive operations or hidden admin functionality",
"step": 2
}
],
"sarif_rule_id": "sec-af/sast/cwe-78",
"sarif_security_severity": 2.5,
"severity": "medium",
"tags": [],
"title": "Command Injection in resolve_system_debug GraphQL Resolver",
"verdict": "confirmed"
},
{
"chain_id": null,
"chain_step": null,
"compliance": [
{
"control_id": "Req 6.2.4",
"control_name": "Custom software addresses common coding vulnerabilities",
"framework": "PCI-DSS"
},
{
"control_id": "CC7",
"control_name": "System operations",
"framework": "SOC2"
},
{
"control_id": "A03:2021",
"control_name": "Injection",
"framework": "OWASP"
},
{
"control_id": "\u00a7164.312(c)(1)",