logo

428 Inappropriate coding practices - invalid file


Description

Files are stored in the repository that cannot be verified because their content is not compatible with their extension.


Impact

- Difficult security auditing process. - Cause an inadequate operation in the different applications that make use of it.


Recommendation

- Verify the identified files and adjust their content to their corresponding extension.


Threat

Attacker authenticated from the Internet with access to the source code.


Expected Remediation Time

15 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: N
  • Confidentiality (VC): N
  • Integrity (VI): N
  • Availability (VA): L
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: U

Requirements


Fixes


Last updated

2024/02/21