Announcement

Collapse
No announcement yet.
X
  • Filter
  • Time
Clear All
new posts

    Smartclient Security Vulnerailties question

    Hi we are using Smartclient power edition v14.1 with nightly build 2025-11-21.

    We scanned our application for security vulnerabilities using veracode its showing couple vulerabilities. For E.g in com/isomorphic/scripting/ScriptGroovy.java in isomorphic_core_rpc.jar

    security scanner identified issue on -->Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

    Attack Vector: javax.script.ScriptEngine.eval

    Number of Modules Affected: 1

    Description: This call to javax.script.ScriptEngine.eval() contains untrusted input. If this input could be modified by an attacker, arbitrary code could be executed. The first argument to eval() contains tainted data from the variable evalScript. The tainted data originated from earlier calls to AnnotationVirtualController.vc_annotation_entry, AnnotationVirtualController.vc_taintobj, and java.net.URLConnection.getInputStream.


    also attached couple more places in the screenshot.

    can you please help us in this what should be the remedy on this .

    Thanks,
    Mohideen
    Last edited by kmbilal; 4 Dec 2025, 07:01.

    #2
    Please never report results directly from security scanners, as they produce many false positives (this is one).

    You are required to review the supposed security issue with a security professional before posting here. If you want Isomorphic to serve as the security professional in this case and explain the scanner results to you, that is available, as an hourly service.

    Comment


      #3
      sure thanks will check from our end

      Comment

      Working...
      X