This article covers Python support and vulnerability detection for Mend SAST.
Mend SAST-supported Python file types
File Type |
|---|
.py |
.pyi |
.htm |
.html |
.jinja |
.jinja2 |
Mend SAST-supported Python frameworks
Framework |
|---|
Django |
Django Templates |
Flask |
Flask Jinja 2 |
AIOHTTP |
Bottle |
CherryPy |
FastAPI |
Masonite |
Pyramid |
web2py |
Mend SAST-supported Python vulnerability types
The Python vulnerability types detected by SAST are provided below and are organized by CWE ID within each of their identified severities.
Python high-severity vulnerability types
CWE | Vulnerability Type | Low Probability Impact |
CWE-22 | Path/Directory Traversal | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access) Additional Taint Sinks: Disabling standard autoescape implementations
|
CWE-78 | Command Injection | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-79 | Cross-Site Scripting | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-89 | SQL Injection | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-94 | Code Injection | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-502 | Deserialization of Untrusted Data | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-643 | XPath Injection | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-732 | Incorrect Permission Assignment for Critical Resource | |
CWE-918 | Server-Side Request Forgery | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-943 | Improper Neutralization of Special Elements in Data Query Logic | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
Python medium-severity vulnerability types
CWE | Vulnerability Type | Low Probability Impact |
CWE-90 | LDAP Injection | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-209 | Generation of Error Message Containing Sensitive Information | |
CWE-295 | Improper Certificate Validation | |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm | |
CWE-377 | Insecure Temporary File | |
CWE-400 | Uncontrolled Resource Consumption | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-611 | Improper Restriction of XML External Entity Reference | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-676 | Use of Potentially Dangerous Function | |
CWE-798 | Use of Hard-coded Credentials | |
CWE-1336 | Server-Side Template Injection | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
Python low-severity vulnerability types
CWE | Vulnerability Type | Low Probability Impact |
CWE-20 | Mail Relay | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-20 | Memcache Injection Vulnerability | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-117 | Improper Output Neutralization for Logs | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-328 | Use of Weak Hash | |
CWE-601 | Unvalidated/Open Redirect | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-941 | Arbitrary Server Connection | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|
CWE-1333 | Regex Denial of Service (ReDoS) | Additional Taint Sources: Content from files and streams, databases, environment (command line calls, main method arguments, environment variables, configurations, url access)
|