ListenReadSpeaker webReader: ListenOverviewIn this assignment, you’ll conduct a dependency check, a type of static testing that detects vulnerabilities associated with library ...

1 answer below »






Overview




In this assignment, you’ll conduct a dependency check, a type of static testing that detects vulnerabilities associated with library dependencies needed for the application. Static testing lets you identify vulnerabilities in the code without executing the code. In this assignment, you’ll do the following:







  • Identify software security vulnerabilities by running code through a static tester.



  • Identify potential mitigation techniques that have been used to mitigate against vulnerabilities associated with known exploits.







Scenario




You’re a senior software developer on a team of software developers. The team is responsible for a large web application that uses Spring Framework.




The software development team discussed the vulnerabilities in the code base from your manual code review. The team plans to mitigate against the vulnerabilities. The team also supports a new functionality that requires the addition of a new library. A best practice for ensuring secure code is to use a dependency check to check the refactored code base and the additional library. There are tools to help with dependency checks. You’ll integrate a dependency-check tool into your vulnerability assessment workflow.




Directions




To begin, open the Module Two Coding Assignment Code Base, linked in the Supporting Materials section, in Eclipse. Refer to the Uploading Files to Eclipse Desktop Version Tutorial, linked in the Supporting Materials section, for testing the code base in Eclipse. Then integrate the Maven Dependency-Check Plug-In for the code base.







Please note: Integrating the static testing tool was a non-graded task that you should have completed in the previous module. You may have already completed these steps.




Follow the instructions in the Integrating the Maven Dependency-Check Plug-in Tutorial, linked in Supporting Materials, to learn how to integrate and run the dependency-check plug-in into Maven for conducting static testing.


Use the instructions in the tutorial to identify the software security vulnerabilities, and document in the Module Two Coding Assignment Template, linked in What to Submit.




Specifically, you must address the following rubric criteria:










  1. Run the dependency check

    on the code base. Include a screenshot of the resulting HTML report in your Module Two Coding Assignment Template. Make certain the screenshot includes the scan information at the top of the dependency-check report.






  2. Document the results

    from the dependency check. In your Module Two Coding Assignment Template, make certain to include the codes and descriptions of each dependency that you found.






  3. Analyze the results


    to identify the best solutions for addressing dependencies in the code base. Summarize your findings in your Module Two Coding Assignment Template. You can refer to industry standard guidelines such as the Common Vulnerabilities and Exposures (CVE) and the National Vulnerability Database (NVD), both linked in Supporting Materials.






    1. Also consider why you should filter false positives from the dependency-check tool



    2. Discuss this in the Module Two Coding Assignment Template.









To learn about the dependencies and interpret the results from the report, click on each dependency listed as shown below.







Dependency check report. A box outlines the dependency header and an example link to the dependency description.





Information about the dependency description, its severity, and potential solutions will also be available from the NVD. You can access this information by clicking on the matching Common Platform Enumeration (CPE), then selecting the Vulnerability ID.







Dependency check report. A box outlines the CPE header and an example link to the CPE description.








Search Results on the National Vulnerability Database website. A box outlines the Vuln ID header and an example link to the Vulnerability ID description.





What to Submit




Submit your completed

Module Two Coding Assignment Template. Your completed assignment should be 1 to 2 pages long. Make certain to include a screenshot of the HTML output from the dependency check. Summarize the dependency-check results and potential solutions. Sources should be cited according to APA style.

Answered Same DayJan 12, 2023

Answer To: ListenReadSpeaker webReader: ListenOverviewIn this assignment, you’ll conduct a...

Aditi answered on Jan 12 2023
34 Votes
CS 305 Module Two Coding Assignment Template
Instructions
Replace the bracketed text with the relevant information in your own words. If you choose to i
nclude images or supporting materials, make certain to insert them in all the relevant locations in the document.
1. Run Dependency Check
(
1
)
2. Document Results
logback-core-1.2.3.jar – An attacker with the required privileges to edit config files could create a configuration to execute code loaded from LDAP servers. Code: CVE-2021-42550
mongo-java-driver-2.4.jar – Certain versions of the Java driver fail to perform correct hostname verification on the KMS server’s certificate. This could result in interception of traffic between the driver and the service rendering Field Level Encryption ineffective. Code: CVE-2021-20328
snakeyaml-1.25.jar – Earlier versions may allow entity expansion during a load operation. Code: CVE- 2017-18640. Other dependency codes include: CVE-2022-25857, CVE-2022-38749, CVE-2022-38751, CVE-2022-38752, and CVE-2022-38750.
spring-boot-2.2.4.RELEASE.jar – Earlier versions were vulnerable to temporary directory hijacking. Code: CVE-2022-27772
tomcat-embed-core-9.0.30.jar – Mistrusted connections could result in exploits from attackers. This could lead to remote code execution being performed. Code: CVE-2020-1938. Other dependency codes include: CVE-2020-11996, CVE-2020-13934, CVE-2020-13935, CVE-2020-17527, CVE-2020-25122, CVE- 2021-41079, CVE-2022-29885, CVE-2020-9484, CVE-2021-25329, CVE-2021-30640, CVE-2022-34305, CVE-2021-24122,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here