Evalution of Findbugs: Arooj Fatima Anam Khan Sumaya Basheer
Evalution of Findbugs: Arooj Fatima Anam Khan Sumaya Basheer
Evalution of Findbugs: Arooj Fatima Anam Khan Sumaya Basheer
Arooj Fatima
Anam Khan
Sumaya Basheer
Description
statement =
Method may fail to close
getConnection_dmiConstantDbPasswordCORR
database resource on
ECT().prepareStatement(query);
expectation
Comparison of String
System.out.println(" - " + (string1 ==
objects using == or !=
string2));
How it works?
Correctness
if ("SomeValue".equals(this.checkStrValue)) {
// Condition 1
Useless control flow
} else if
("SomeValue".equals(this.checkStrValue)) {
// Condition 2
};
How it works?
Security
1.Injection
2.Broken Authentication
3.Sensitive data exposure Anyone building a web-
4. XML External Entities (XXE) application should know
5.Broken Access control about these vulnerabilities:
6.Security misconfigurations
7.Cross Site Scripting (XSS)
8.Insecure Deserialization
9.Using Components with known
vulnerabilities
10.Insufficient logging and
monitoring
1. XML External Entities (XXE)
Injection
Trust boundary violation
Sensitive data exposure
Secure flag
XML External Entities (XXE)
How about False alarms?
false positive
GUI
Plugin
CommandLine
GUI?
lets have a look
[Point to java
files]
Command prompt?
lets see Commands
Directory
To open findbugs GUI: name
General Commands:
License?
it's open source