javaspringvulny Security Analysis Report

🕒 Generated on 2025-10-03 22:15:22
0 Error
0 Warning
0 Note
0 None
0 Unknown
Type Severity Description File Confidence
â–¶ SQL Injection Error SQL Injection via string concatenation in ApiController.getUser user lookup query. src/main/java/hawk/controller/ApiController.java 10
â–¶ SSRF Error Server-Side Request Forgery (SSRF): endpoint fetches attacker-supplied URL without validation. src/main/java/hawk/controller/ApiController.java 10
â–¶ Broken Access Control Error Broken access control: client-controlled isAdmin/currentUserId used for authorization in user-data endpoint. src/main/java/hawk/controller/ApiController.java 10
â–¶ IDOR Error IDOR: /api/user-data/{userId} authorizes access using attacker-controlled request parameters (currentUserId, isAdmin) instead of the authenticated principal. src/main/java/hawk/controller/ApiController.java 9
â–¶ SQL Injection Error Triage: SQL Injection in ApiController.login() via concatenating HTTP request parameter 'username' into SQL. src/main/java/hawk/controller/ApiController.java 10
â–¶ XSS Error Reflected XSS by echoing unsanitized input into HTML response. src/main/java/hawk/controller/ApiController.java 10
â–¶ Broken Authentication Error Broken authentication in email verification: token is just userId and timestamp with only a time-window check. src/main/java/hawk/controller/ApiController.java 9
â–¶ Broken Access Control Error Broken access control: /api/secure-download authorizes solely by token length. src/main/java/hawk/controller/ApiController.java 9