Detected empty trust manager implementations. This is dangerous because it accepts any certificate, enabling man-in-the-middle attacks. Consider using a KeyStore and TrustManagerFactory instead. See https://stackoverflow.com/questions/2642777/trusting-all-certificates-using-httpclient-over-https for more information. Likelihood: LOW Confidence: LOW CWE: - CWE-295: Improper Certificate Validation
OWASP: - A03:2017 - Sensitive Data Exposure
- A07:2021 - Identification and Authentication Failures
defaulthttpclient-is-deprecated
DefaultHttpClient is deprecated. Further, it does not support connections using TLS1.2, which makes using DefaultHttpClient a security hazard. Use HttpClientBuilder instead. Likelihood: LOW Confidence: LOW CWE: - CWE-326: Inadequate Encryption Strength
OWASP: - A03:2017 - Sensitive Data Exposure
- A02:2021 - Cryptographic Failures
insecure-hostname-verifier
Insecure HostnameVerifier implementation detected. This will accept any SSL certificate with any hostname, which creates the possibility for man-in-the-middle attacks. Likelihood: LOW Confidence: LOW CWE: - CWE-295: Improper Certificate Validation
OWASP: - A03:2017 - Sensitive Data Exposure
- A07:2021 - Identification and Authentication Failures
avoid-implementing-custom-digests
Cryptographic algorithms are notoriously difficult to get right. By implementing a custom message digest, you risk introducing security issues into your program. Use one of the many sound message digests already available to you: MessageDigest sha256Digest = MessageDigest.getInstance(“SHA256”); Likelihood: LOW Confidence: LOW CWE: - CWE-327: Use of a Broken or Risky Cryptographic Algorithm
OWASP: - A03:2017 - Sensitive Data Exposure
- A02:2021 - Cryptographic Failures