Guest User

Untitled

a guest
Oct 27th, 2018
98
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.78 KB | None | 0 0
  1. 11 vulnerabilities found:
  2. Vulnerability 1:
  3. File: auth.py
  4. > User input at line 86, source "form[":
  5. email = request.form['email']
  6. Reassigned in:
  7. File: auth.py
  8. > Line 14: save_2_email = email
  9. File: auth.py
  10. > Line 14: email = save_2_email
  11. File: auth.py
  12. > reaches line 116, sink "execute(":
  13. ~call_12 = ret_cursor.execute(query, (username, email))
  14.  
  15. Vulnerability 2:
  16. File: auth.py
  17. > User input at line 87, source "form[":
  18. username = request.form['username']
  19. Reassigned in:
  20. File: auth.py
  21. > Line 14: save_2_username = username
  22. File: auth.py
  23. > Line 14: username = save_2_username
  24. File: auth.py
  25. > reaches line 116, sink "execute(":
  26. ~call_12 = ret_cursor.execute(query, (username, email))
  27.  
  28. Vulnerability 3:
  29. File: auth.py
  30. > User input at line 86, source "form[":
  31. email = request.form['email']
  32. Reassigned in:
  33. File: auth.py
  34. > Line 14: save_2_email = email
  35. File: auth.py
  36. > Line 14: email = save_2_email
  37. File: auth.py
  38. > reaches line 133, sink "execute(":
  39. ~call_17 = ret_cursor.execute(insert, (username, email, password_hash))
  40.  
  41. Vulnerability 4:
  42. File: auth.py
  43. > User input at line 87, source "form[":
  44. username = request.form['username']
  45. Reassigned in:
  46. File: auth.py
  47. > Line 14: save_2_username = username
  48. File: auth.py
  49. > Line 14: username = save_2_username
  50. File: auth.py
  51. > reaches line 133, sink "execute(":
  52. ~call_17 = ret_cursor.execute(insert, (username, email, password_hash))
  53.  
  54. Vulnerability 5:
  55. File: auth.py
  56. > User input at line 88, source "form[":
  57. password = request.form['secretPassword']
  58. Reassigned in:
  59. File: auth.py
  60. > Line 14: save_2_password = password
  61. File: auth.py
  62. > Line 14: password = save_2_password
  63. File: auth.py
  64. > Line 126: ~call_14 = ret_generate_password_hash(password, method='pbkdf2:sha256', salt_length=10)
  65. File: auth.py
  66. > Line 126: password_hash = ~call_14
  67. File: auth.py
  68. > reaches line 133, sink "execute(":
  69. ~call_17 = ret_cursor.execute(insert, (username, email, password_hash))
  70. This vulnerability is unknown due to: Label: ~call_14 = ret_generate_password_hash(password, method='pbkdf2:sha256', salt_length=10)
  71.  
  72. Vulnerability 6:
  73. File: auth.py
  74. > User input at line 87, source "form[":
  75. username = request.form['username']
  76. Reassigned in:
  77. File: auth.py
  78. > Line 14: save_2_username = username
  79. File: auth.py
  80. > Line 14: username = save_2_username
  81. File: auth.py
  82. > Line 119: ~call_13 = ret_'User {0} is already registered.'.format(username)
  83. File: auth.py
  84. > Line 119: error = ~call_13
  85. File: auth.py
  86. > reaches line 144, sink "flash(":
  87. ~call_24 = ret_flash(error)
  88. This vulnerability is unknown due to: Label: ~call_13 = ret_'User {0} is already registered.'.format(username)
  89.  
  90. Vulnerability 7:
  91. File: auth.py
  92. > User input at line 176, source "form[":
  93. username = request.form['username']
  94. Reassigned in:
  95. File: auth.py
  96. > Line 14: save_4_username = username
  97. File: auth.py
  98. > Line 14: username = save_4_username
  99. File: auth.py
  100. > Line 274: save_14_username = username
  101. File: auth.py
  102. > Line 274: username = save_14_username
  103. File: auth.py
  104. > reaches line 184, sink "execute(":
  105. ~call_16 = ret_cnx.execute('SELECT email, password FROM user WHERE email = %s', (username))
  106.  
  107. Vulnerability 8:
  108. File: auth.py
  109. > User input at line 176, source "form[":
  110. username = request.form['username']
  111. Reassigned in:
  112. File: auth.py
  113. > Line 14: save_4_username = username
  114. File: auth.py
  115. > Line 14: username = save_4_username
  116. File: auth.py
  117. > Line 274: save_14_username = username
  118. File: auth.py
  119. > Line 274: username = save_14_username
  120. File: auth.py
  121. > reaches line 187, sink "execute(":
  122. ~call_17 = ret_cnx.execute('SELECT username, password FROM user WHERE username = %s', (username))
  123.  
  124. Vulnerability 9:
  125. File: auth.py
  126. > User input at line 176, source "form[":
  127. username = request.form['username']
  128. Reassigned in:
  129. File: auth.py
  130. > Line 14: save_4_username = username
  131. File: auth.py
  132. > Line 14: username = save_4_username
  133. File: auth.py
  134. > Line 274: save_14_username = username
  135. File: auth.py
  136. > Line 274: username = save_14_username
  137. File: auth.py
  138. > reaches line 205, sink "execute(":
  139. ~call_20 = ret_cnx.execute('UPDATE user SET token = %s WHERE email = %s', (uniqueToken, username))
  140.  
  141. Vulnerability 10:
  142. File: auth.py
  143. > User input at line 176, source "form[":
  144. username = request.form['username']
  145. Reassigned in:
  146. File: auth.py
  147. > Line 14: save_4_username = username
  148. File: auth.py
  149. > Line 14: username = save_4_username
  150. File: auth.py
  151. > Line 274: save_14_username = username
  152. File: auth.py
  153. > Line 274: username = save_14_username
  154. File: auth.py
  155. > reaches line 208, sink "execute(":
  156. ~call_21 = ret_cnx.execute('UPDATE user SET token = %s WHERE username = %s', (uniqueToken, username))
  157.  
  158. Vulnerability 11:
  159. File: auth.py
  160. > User input at line 237, source "Framework function URL parameter":
  161. userid
  162. File: auth.py
  163. > reaches line 245, sink "execute(":
  164. ~call_11 = ret_cnx.execute('DELETE FROM user WHERE id = %s', (userid))
Add Comment
Please, Sign In to add comment