Skip to content
GitHub Actions / AppScan CodeSweep #2 required action Dec 19, 2024 in 0s

Open communication detected in Xamarin

Identified by HCL AppScan CodeSweep
Vulnerability: Communications.Unencrypted
Severity: Low

Details

Missing Encryption of Sensitive Data

Open communication detected in Xamarin

Cause

Open communications is using connections to other systems over an insecure channel. All connections should be SSL aware; use https instead of http. This rule attempts to identify where lingering open communications exist in the code base. Other considerations are the use of unsafe schemes such as javascript://, telnet://, file:// and ftp://. Note that this is not an exhaustive list. The rule catches the most glaring open communication schemes available today.

var host = "127.0.0.1";
var port = "8080";

HttpClient client = new HttpClient();
var response = client.GetAsync("http://" + host + ":" + port);

Fix recommendation

Use a proper, secure way of calling the URLs, such as https and ftps version of any URL.

var host = "127.0.0.1";
var port = "8080";

HttpClient client = new HttpClient();
var response = client.GetAsync("https://" + host + ":" + port);

External references

OWASP - TLS Cipher String Cheat Sheet

OWASP - Transport Layer Protection Cheat Sheet

Copyright © 2021, 2023 HCL Technologies Limited | Disclaimer

Annotations

Check warning on line 83 in src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs

See this annotation in the file changed.

@github-actions github-actions / AppScan CodeSweep #2

Open communication detected in Xamarin

Vulnerability: Communications.Unencrypted	[Severity: Low]
Raw output
{"file":"IServiceCollectionExtensions.cs","filePath":"src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs","lineNumber":83,"columnNumber":0,"language":"Xamarin","vulnName":"Open communication detected in Xamarin","vulnType":"Communications.Unencrypted","ruleName":"com.hcl.appscan.scanner.xamarin.rules.OpenCommunicationXamarin","context":"\"http://{musicSettings.LavalinkHost}:2333\"","severity":2,"codeFixes":[{"description":"Use secure URI scheme","name":"com.ouncelabs.languagelite.common.rules.fix.SecureCommFix"}],"hashValues":{"0":1508174403,"1":1508174403,"2":-2032068290,"3":-2032068290,"4":1817155115,"5":1817155115}}

Check warning on line 87 in src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs

See this annotation in the file changed.

@github-actions github-actions / AppScan CodeSweep #2

Open communication detected in Xamarin

Vulnerability: Communications.Unencrypted	[Severity: Low]
Raw output
{"file":"IServiceCollectionExtensions.cs","filePath":"src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs","lineNumber":87,"columnNumber":0,"language":"Xamarin","vulnName":"Open communication detected in Xamarin","vulnType":"Communications.Unencrypted","ruleName":"com.hcl.appscan.scanner.xamarin.rules.OpenCommunicationXamarin","context":"\"http://AzzyBot-Ms:{musicSettings.LavalinkPort}\"","severity":2,"codeFixes":[{"description":"Use secure URI scheme","name":"com.ouncelabs.languagelite.common.rules.fix.SecureCommFix"}],"hashValues":{"0":504140531,"1":504140531,"2":-605201402,"3":-605201402,"4":1934270771,"5":1934270771}}

Check warning on line 87 in src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs

See this annotation in the file changed.

@github-actions github-actions / AppScan CodeSweep #2

Open communication detected in Xamarin

Vulnerability: Communications.Unencrypted	[Severity: Low]
Raw output
{"file":"IServiceCollectionExtensions.cs","filePath":"src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs","lineNumber":87,"columnNumber":0,"language":"Xamarin","vulnName":"Open communication detected in Xamarin","vulnType":"Communications.Unencrypted","ruleName":"com.hcl.appscan.scanner.xamarin.rules.OpenCommunicationXamarin","context":"\"http://localhost:{musicSettings.LavalinkPort}\"","severity":2,"codeFixes":[{"description":"Use secure URI scheme","name":"com.ouncelabs.languagelite.common.rules.fix.SecureCommFix"}],"hashValues":{"0":1099925168,"1":1099925168,"2":-1596616073,"3":-1596616073,"4":-2082101396,"5":-2082101396}}

Check warning on line 79 in src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs

See this annotation in the file changed.

@github-actions github-actions / AppScan CodeSweep #2

Open communication detected in Xamarin

Vulnerability: Communications.Unencrypted	[Severity: Low]
Raw output
{"file":"IServiceCollectionExtensions.cs","filePath":"src/AzzyBot.Bot/Extensions/IServiceCollectionExtensions.cs","lineNumber":79,"columnNumber":0,"language":"Xamarin","vulnName":"Open communication detected in Xamarin","vulnType":"Communications.Unencrypted","ruleName":"com.hcl.appscan.scanner.xamarin.rules.OpenCommunicationXamarin","context":"\"http://{musicSettings.LavalinkHost}:{musicSettings.LavalinkPort}\"","severity":2,"codeFixes":[{"description":"Use secure URI scheme","name":"com.ouncelabs.languagelite.common.rules.fix.SecureCommFix"}],"hashValues":{"0":1196901791,"1":1196901791,"2":-530785606,"3":-530785606,"4":74171015,"5":74171015}}