-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: GEO-1237, GEO-1238 - fixed critical security issues identified in WAVA scan #858
Conversation
…oken' parameter is valid
…ainst CSRF attacks, but it's not so strict as to break the login flow.
Quality Gate passed for 'Pay Transparency backend-external'Issues Measures |
Quality Gate passed for 'Pay Transparency Frontend'Issues Measures |
Quality Gate failed for 'Pay Transparency Backend'Failed conditions |
Quality Gate passed for 'Pay Transparency admin-frontend'Issues Measures |
Quality Gate passed for 'Pay Transparency doc-gen-service'Issues Measures |
Description
Fixed two scenarios where SQL injection attacks on the backend public API were possible. The affected endpoints are:
Both endpoints now perform additional validation on the request body to ensure parameters are of the right type.
Also explicitly set the cookie "samesite" policy for the public app to "lax". Lax provides some protection against Cross Site Request Forgery attacks. This is one step down from "strict", which would be preferable, but our use of a third party site for login means we cannot use "strict" without some other changes to the login process. We were probably using the "lax" policy previously because it may have been enabled by default, but not it is enabled explicitly for the public site.
Fixes # GEO-1237
Also applied the same cookie "samesite" policy as noted above to the admin site.
Fixes # GEO-1238
Type of change
How Has This Been Tested?
Updated unit tests
Checklist
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are deployed in:
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are deployed in:
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are deployed in: