CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
      • Csharp
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
      • Html
      • Java
      • Javascript
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
        • Insecure-transport
          • Go stdlib
          • Java spring
          • Java stdlib
          • Js node
          • Ruby stdlib
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
      • Terraform
      • Typescript
      • Yaml
    Insecure-transport

    Js node

    Detects direct creations of $HTTPS servers that don’t disallow SSL v2, SSL v3, and TLS v1. These protocols are deprecated due to POODLE, man in the middle attacks, and other vulnerabilities.
    Likelihood: MEDIUM
    Confidence: MEDIUM
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A
    - 0
    - 3
    - :
    - 2
    - 0
    - 1
    - 7
    -

    - -
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - D
    - a
    - t
    - a
    -

    - E
    - x
    - p
    - o
    - s
    - u
    - r
    - e

    Checks for any usage of http servers instead of https servers. Encourages the usage of https protocol instead of http, which does not have TLS and is therefore unencrypted. Using http can lead to man-in-the-middle attacks in which the attacker is able to read sensitive information.
    Likelihood: LOW
    Confidence: LOW
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A02:2021 - Cryptographic Failures
    - A03:2017 - Sensitive Data Exposure

    Checks for lack of usage of the “secure: true” option when sending ftp requests through the nodejs ftp module. This leads to unencrypted traffic being sent to the ftp server. There are other options such as “implicit” that still does not encrypt all traffic. ftp is the most utilized npm ftp module.
    Likelihood: MEDIUM
    Confidence: MEDIUM
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A
    - 0
    - 3
    - :
    - 2
    - 0
    - 1
    - 7
    -

    - -
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - D
    - a
    - t
    - a
    -

    - E
    - x
    - p
    - o
    - s
    - u
    - r
    - e

    Checks for requests sent to http:// URLs. This is dangerous as the server is attempting to connect to a website that does not encrypt traffic with TLS. Instead, only send requests to https:// URLs.
    Likelihood: MEDIUM
    Confidence: MEDIUM
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A
    - 0
    - 3
    - :
    - 2
    - 0
    - 1
    - 7
    -

    - -
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - D
    - a
    - t
    - a
    -

    - E
    - x
    - p
    - o
    - s
    - u
    - r
    - e

    Detects creations of $HTTPS servers from option objects that don’t disallow SSL v2, SSL v3, and TLS v1. These protocols are deprecated due to POODLE, man in the middle attacks, and other vulnerabilities.
    Likelihood: MEDIUM
    Confidence: MEDIUM
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A
    - 0
    - 3
    - :
    - 2
    - 0
    - 1
    - 7
    -

    - -
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - D
    - a
    - t
    - a
    -

    - E
    - x
    - p
    - o
    - s
    - u
    - r
    - e

    Checks for creation of telnet servers or attempts to connect through telnet. This is insecure as the telnet protocol supports no encryption, and data passes through unencrypted.
    Likelihood: MEDIUM
    Confidence: MEDIUM
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A
    - 0
    - 3
    - :
    - 2
    - 0
    - 1
    - 7
    -

    - -
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - D
    - a
    - t
    - a
    -

    - E
    - x
    - p
    - o
    - s
    - u
    - r
    - e

    Checks for setting the environment variable NODE_TLS_REJECT_UNAUTHORIZED to 0, which disables TLS verification. This should only be used for debugging purposes. Setting the option rejectUnauthorized to false bypasses verification against the list of trusted CAs, which also leads to insecure transport. These options lead to vulnerability to MTM attacks, and should not be used.
    Likelihood: MEDIUM
    Confidence: MEDIUM
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A
    - 0
    - 3
    - :
    - 2
    - 0
    - 1
    - 7
    -

    - -
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - D
    - a
    - t
    - a
    -

    - E
    - x
    - p
    - o
    - s
    - u
    - r
    - e

    Checks for requests to http (unencrypted) sites using some of node js’s most popular REST/HTTP libraries, including node-rest-client, axios, and got.
    Likelihood: MEDIUM
    Confidence: MEDIUM
    CWE:
    - C
    - W
    - E
    - -
    - 3
    - 1
    - 9
    - :
    -

    - C
    - l
    - e
    - a
    - r
    - t
    - e
    - x
    - t
    -

    - T
    - r
    - a
    - n
    - s
    - m
    - i
    - s
    - s
    - i
    - o
    - n
    -

    - o
    - f
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - I
    - n
    - f
    - o
    - r
    - m
    - a
    - t
    - i
    - o
    - n
    OWASP:
    - A
    - 0
    - 3
    - :
    - 2
    - 0
    - 1
    - 7
    -

    - -
    -

    - S
    - e
    - n
    - s
    - i
    - t
    - i
    - v
    - e
    -

    - D
    - a
    - t
    - a
    -

    - E
    - x
    - p
    - o
    - s
    - u
    - r
    - e

    Java stdlibRuby stdlib
    twitterlinkedin
    Powered by Mintlify
    Assistant
    Responses are generated using AI and may contain mistakes.