Why you should care
It is common to think that internal web applications are deployed where they can only be accessed from trusted users. But in reality you can often find situations where the security policy needs to change, for example the ports or the source address to access to the web server might change or the mix of security policy and Network Address Translation policy open an unwanted address, port
A JSP application is not secured if the web.xml that doesn’t match the following conditions:
* Existence of node: security-constraint/web-resource-collection/url-pattern
* Existence of node: security-constraint/auth-constraint in the same node than the previous security-constraint node
* the url-pattern defined in security-constraint/web-resource-collection/url-pattern match at least one JSP page or a Servlet
CAST Recommendations
References
https://docs.oracle.com/cd/E19798-01/821-1841/bncbk/index.html
How we detect
a <web-resource-collection><url-pattern> node .
an <auth-constraint> node.
Note : the web.xml file can contain several <security-constraint> tags. There is no violation for the rule if at least one of them is compliant with the above.
Why you should care
Therefore, it is recommended to manage transactions as they ensure data integrity and handle database errors as well.
CAST Recommendations
Business Impacts
When involving transactions, it is important to note that the risks involved can hamper productivity since losing transactions is equivalent to losing records requiring the code to be rewritten. Loss of Productivity results in loss of time causing unsatisfactory work.
References
https://www.tutorialspoint.com/sql/sql-transactions.htm
How we detect
This code insight manages transactions with Functions and Procedures when a table is inserted, updated or deleted.
About CAST and Highlight’s Code Insights
Over the last 25 years, CAST has leveraged unique knowledge on software quality measurement by analyzing thousands of applications and billions of lines of code. Based on this experience and community standards on programming best practices, Highlight implements hundreds of code insights across 15+ technologies to calculate health factors of a software.