Skip to content

fix: spring boot applications store database connect... in...#974

Open
orbisai0security wants to merge 1 commit into
macrozheng:masterfrom
orbisai0security:fix-hardcoded-credentials-externalize-secrets
Open

fix: spring boot applications store database connect... in...#974
orbisai0security wants to merge 1 commit into
macrozheng:masterfrom
orbisai0security:fix-hardcoded-credentials-externalize-secrets

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in mall-admin/src/main/resources/application.yml.

Vulnerability

Field Value
ID V-002
Severity CRITICAL
Scanner multi_agent_ai
Rule V-002
File mall-admin/src/main/resources/application.yml:1

Description: Spring Boot applications store database connection strings, passwords, Redis credentials, JWT signing secrets, and third-party API keys in application.yml or application.properties files. The security assessment found no evidence of secrets externalization through Spring Cloud Config, HashiCorp Vault, or environment variable references (${ENV_VAR} syntax) in the mall-admin and mall-security modules. If credentials are hardcoded in these configuration files and committed to version control, any person with repository read access — including developers, contractors, or an attacker who obtains repository access — can extract credentials and directly connect to backend databases, bypassing all Spring Security controls. JWT secret exposure additionally allows forging of arbitrary authentication tokens.

Changes

  • mall-admin/src/main/resources/application.yml
  • mall-admin/src/main/resources/application-prod.yml

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix generated by OrbisAI Security
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant