Skip to content

Commit 62ad236

Browse files
tooryxcopybara-github
authored andcommitted
Ensure references generated by the weak credential detector cannot contain spaces.
PiperOrigin-RevId: 831273342 Change-Id: I7c829676dbd16a422998deea08ec4b27ad9d40be
1 parent e10d1d3 commit 62ad236

File tree

2 files changed

+8
-7
lines changed

2 files changed

+8
-7
lines changed

google/detectors/credentials/generic_weak_credential_detector/src/main/java/com/google/tsunami/plugins/detectors/credentials/genericweakcredentialdetector/GenericWeakCredentialDetector.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,8 @@ private void addFindingForCredential(
216216
}
217217

218218
private static String buildVulnerabilityId(NetworkService networkService) {
219-
return "WEAK_CREDENTIALS_FOR_" + Ascii.toUpperCase(getServiceName(networkService));
219+
var name = "WEAK_CREDENTIALS_FOR_" + Ascii.toUpperCase(getServiceName(networkService));
220+
return name.replace(' ', '_');
220221
}
221222

222223
private static String getServiceName(NetworkService networkService) {

google/detectors/credentials/generic_weak_credential_detector/src/test/java/com/google/tsunami/plugins/detectors/credentials/genericweakcredentialdetector/GenericWeakCredentialDetectorTest.java

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ public MockResponse dispatch(RecordedRequest request) throws InterruptedExceptio
152152
.setNetworkEndpoint(
153153
forHostnameAndPort(mockWebServer.getHostName(), mockWebServer.getPort()))
154154
.setTransportProtocol(TransportProtocol.TCP)
155-
.setServiceName("wordpress")
155+
.setServiceName("word press")
156156
.build();
157157
wpWebService =
158158
NetworkService.newBuilder()
@@ -164,7 +164,7 @@ public MockResponse dispatch(RecordedRequest request) throws InterruptedExceptio
164164
ServiceContext.newBuilder()
165165
.setWebServiceContext(
166166
WebServiceContext.newBuilder()
167-
.setSoftware(Software.newBuilder().setName("wordpress").build())
167+
.setSoftware(Software.newBuilder().setName("word press").build())
168168
.build())
169169
.build())
170170
.build();
@@ -196,7 +196,7 @@ private DetectionReportList runDetectOnMockWebServer() {
196196
.setNetworkEndpoint(
197197
forHostnameAndPort(mockWebServer.getHostName(), mockWebServer.getPort()))
198198
.setTransportProtocol(TransportProtocol.TCP)
199-
.setServiceName("wordpress")
199+
.setServiceName("word press")
200200
.build()));
201201
}
202202

@@ -225,13 +225,13 @@ private DetectionReport.Builder generateDetectionReport(
225225
.setMainId(
226226
VulnerabilityId.newBuilder()
227227
.setPublisher("GOOGLE")
228-
.setValue("WEAK_CREDENTIALS_FOR_WORDPRESS"))
228+
.setValue("WEAK_CREDENTIALS_FOR_WORD_PRESS"))
229229
.setSeverity(Severity.CRITICAL)
230-
.setTitle("Weak 'wordpress' service credential")
230+
.setTitle("Weak 'word press' service credential")
231231
.setCvssV3("7.5")
232232
.setDescription(
233233
String.format(
234-
"Well known or weak credentials are detected for 'wordpress' service on"
234+
"Well known or weak credentials are detected for 'word press' service on"
235235
+ " port '%s'.",
236236
mockWebServer.getPort()))
237237
.setRecommendation("Change the password of all affected users to a strong one.")

0 commit comments

Comments
 (0)