428 – Inappropriate coding practices - invalid file
Description
Files are stored in the repository that cannot be verified because their content is not compatible with their extension.
Impact
- Difficult security auditing process. - Cause an inadequate operation in the different applications that make use of it.
Recommendation
- Verify the identified files and adjust their content to their corresponding extension.
Threat
Attacker authenticated from the Internet with access to the source code.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: H
- Attack Requirements: N
- Privileges required: L
- User interaction: N
- Confidentiality (VC): N
- Integrity (VI): N
- Availability (VA): L
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: U