Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Qwiet.AI AutoFix
This PR was created automatically by the Qwiet.AI autofix tool.
As long as it is open, subsequent scans and generated fixes to this same branch
will be added to it as new commits.
Each commit fixes one vulnerability.
Some manual intervention might be required before merging this PR.
Fixes
AutoPatch applied to src/main/java/io/shiftleft/controller/SearchController.java for finding 98 (Remote Code Execution: Code Injection Through Attacker-controlled Data via
fooinSearchController.doGetSearch) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 80 (Cross-Site Scripting: Attacker-Controlled Data Used as HTML Content via
phoneNumberinCustomerController.debug) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 82 (Cross-Site Scripting: Attacker-Controlled Data Used as HTML Content via
tininCustomerController.debug) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 84 (Cross-Site Scripting: Attacker-Controlled Data Used as HTML Content via
socialSecurityNuminCustomerController.debug) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/AdminController.java for finding 85 (Deserialization: Attacker-controlled Data Used in Unsafe Deserialization Function via
authinAdminController.doPostLogin) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 81 (Cross-Site Scripting: Attacker-Controlled Data Used as HTML Content via
ssninCustomerController.debug) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 83 (Cross-Site Scripting: Attacker-Controlled Data Used as HTML Content via
lastNameinCustomerController.debug) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 99 (Directory Traversal: Attacker-controlled Data Used in File Path via
requestinCustomerController.checkCookie) of project Project1AutoPatch applied to src/main/java/io/shiftleft/controller/AdminController.java for finding 85 (Deserialization: Attacker-controlled Data Used in Unsafe Deserialization Function via
authinAdminController.doPostLogin) of project DLP.Mgmt.OnPrem-MultiAutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 83 (Cross-Site Scripting: Attacker-Controlled Data Used as HTML Content via
lastNameinCustomerController.debug) of project DLP.Mgmt.OnPrem-MultiAutoPatch applied to src/main/java/io/shiftleft/controller/CustomerController.java for finding 99 (Directory Traversal: Attacker-controlled Data Used in File Path via
requestinCustomerController.checkCookie) of project DLP.Mgmt.OnPrem-Multi