I have Fortify ssc scanning my java spring boot project. I have a simple controller that returns an object from the database.
considers this a vulnerability. Is this normal, or am I doing something wrong?
Application Delivery Management
Application Modernization & Connectivity
CyberRes by OpenText
IT Operations Management
I have Fortify ssc scanning my java spring boot project. I have a simple controller that returns an object from the database.
If it were me I would use "Diagram" in the Auditworkbench.
Follow the taint flow (if any) leading to the sink. The thing is IF the return if from a DB then Fortify will likely give is DATABASE and possible XSS if the return value flows into another sink. So if you are sure your DB access can never return some XSS type string (and realistically you cannot be?) then you could add a new custom rule where return value of getMyItems is considered VALIDATED_XSS and whatever other validity you need. Again, use AuditWorkbench to create the rule.
Better to make a brief repro - test your sanitizer, then apply to the wider project. That way you also have either something you can ask here, or provide to MicroFocus for their support teams to look at.