| Severity | File | Line | Rule | Description |
|---|---|---|---|---|
| ERROR | app/Http/Controllers/PaymentController.php | 142 | sql-injection | SQL query built by string concatenation with user-supplied input. Use parameterised queries. |
| ERROR | Dockerfile | 31 | no-user-directive | Container runs as root — specify a non-root USER before CMD. |
| WARNING | app/Services/AuthService.php | 87 | weak-hash-md5 | MD5 used for password hashing — use password_hash() with PASSWORD_BCRYPT. |
| WARNING | app/Http/Controllers/UserController.php | 214 | sensitive-data-in-logs | Variable named 'password' may be written to application logs. |
| WARNING | app/Http/Controllers/ReportController.php | 56 | missing-auth-check | Controller method has no explicit authorisation check. |
| Severity | CVE | Package | CVSS | Description |
|---|---|---|---|---|
| CRITICAL | CVE-2021-3129 | facade/ignition:2.5.1 | 9.8 | Remote code execution via unsafe deserialization in Laravel debug mode. |
| CRITICAL | CVE-2024-22723 | laravel/framework:9.52.0 | 9.1 | SQL injection vulnerability in Eloquent query builder under specific conditions. |
| CRITICAL | CVE-2023-29197 | guzzlehttp/psr7:2.4.3 | 7.5 | Improper header validation allows header injection attacks. |
| HIGH | CVE-2022-24894 | symfony/http-kernel:5.4.19 | 8.1 | Sensitive cookie values may be exposed via HttpCache. |
| HIGH | CVE-2022-23601 | symfony/form:5.4.19 | 8.8 | CSRF token not validated in certain form configurations. |
| ...and 17 more CVEs — see dc-report-full.html for complete list | ||||
| Priority | File | Line | Description |
|---|---|---|---|
| HIGH | app/Http/Controllers/PaymentController.php | 89 | Disabling CSRF protection is security-sensitive — verify this is intentional. |
| HIGH | config/session.php | 12 | HTTP-only flag not set on session cookie — vulnerable to XSS session hijacking. |
| MEDIUM | app/Services/CryptoService.php | 34 | Cipher algorithm AES-128-ECB is not semantically secure — use AES-256-GCM. |
| MEDIUM | app/Http/Middleware/CorsMiddleware.php | 18 | CORS policy allows all origins (*) — restrict to known trusted origins. |
| Item | Value |
|---|---|
| Project | retail-banking-api |
| Repository | dev-team/retail-banking-api |
| Commit SHA | a3f8c92d1e04b7f9b3d2e1f0a9c8 |
| Branch | feature/payment-gateway |
| Scan date | 2026-04-15 09:42:17 UTC |
| Jenkins build | #47 |
| Pipeline status | FAILED |
| Semgrep rulesets | p/php · p/csharp · p/owasp-top-ten · p/security-audit |
| Dependency-Check | v12.1.0 · NVD database 2026-04-15 |
| SonarQube | v10.5.1 · Quality Gate: Security Gate |
| Files scanned | 147 PHP · 4 JS · 1 Dockerfile · 1 XML |