Can you spot the vulnerability? #codeadvent2022 #PHP #appsec

It is always challenging for developers to account for multiple operating systems...

https://www.sonarsource.com/knowledge/code-challenges/advent-calendar-2022/?day=24

the home of clean code

Sonar’s industry leading solution enables developers and development teams to write clean code and remediate existing code organically.

Can you spot the vulnerability? #codeadvent2022 #C #appsec

Is there a way to hit very-sensitive-internal.service?
No TOCTOU here, as the targeted service validates the Host header very strictly.

https://www.sonarsource.com/knowledge/code-challenges/advent-calendar-2022/?day=23

the home of clean code

Sonar’s industry leading solution enables developers and development teams to write clean code and remediate existing code organically.

Can you spot the vulnerability? #codeadvent2022 #csharp #appsec

It's just doing a dummy build, so what could go wrong?

https://www.sonarsource.com/knowledge/code-challenges/advent-calendar-2022/?day=22

the home of clean code

Sonar’s industry leading solution enables developers and development teams to write clean code and remediate existing code organically.

Sonar Research on Twitter

“Can you spot the vulnerability? #codeadvent2022 #csharp This new log ingestion server is super efficient. Let's hope nobody can inject log messages! https://t.co/92rurdax8l”

Twitter
Sonar Research on Twitter

“Can you spot the vulnerability? #codeadvent2022 #JS The administrator is happy to click on any of the links you'll send them, what could go wrong? https://t.co/3BmMOgtZGA”

Twitter
Sonar Research on Twitter

“Can you spot the vulnerability? #codeadvent2022 #Python Who's to blame for this bug? https://t.co/Ho766cpLyz”

Twitter
Sonar Research on Twitter

“Can you spot the vulnerability? #codeadvent2022 #Java Sanitization can be tricky, is there a way to exploit this application? https://t.co/JhKcXbONYQ”

Twitter
Sonar Research on Twitter

“Can you spot the vulnerability? #codeadvent2022 #Java Complex systems are often composed of multiple services communicating with each together. Can you determine how an attacker can leverage this architecture here? https://t.co/p6rQTdPgUb”

Twitter
Sonar Research on Twitter

“Can you spot the vulnerability? #codeadvent2022 #Python Urgh, the maintainers of unstable-avatar-service.tld are breaking their DNS every now and then. What do you think of this new version of my avatar proxy? https://t.co/vTkzDX2a0N”

Twitter

Can you spot the vulnerability? #codeadvent2022 #Java #appsec

Complex systems are often composed of multiple services communicating with each together. Can you determine how an attacker can leverage this architecture here?

https://www.sonarsource.com/knowledge/code-challenges/advent-calendar-2022/?day=21

the home of clean code

Sonar’s industry leading solution enables developers and development teams to write clean code and remediate existing code organically.