[email protected]We are using Avaya Orchestration Designer (OD) 8.1.2 for our IVR application. During a vercode scanner for security scan of the deployed application , we identified a security hotspot reported in the Avaya OD runtime library. attached the report, we need your help to fix the issues
Avaya Orchestration Designer 8.1.2
Collapse
X
-
Error Descriptions
Description
A call uses reflection in an unsafe manner. An attacker can specify the class name to be instantiated, which may create unexpected control flow paths through the application. Depending on how reflection is being used, the attack vector may allow the attacker to bypass security checks or otherwise cause the application to behave in an unexpected manner. Even if the object does not implement the specified interface and a ClassCastException is thrown, the constructor of the untrusted class name will have already executed. Recommendations
Validate the class name against a combination of white and black lists to ensure that only expected behavior is produced. Instances found via Static Scan25 EG-Sphynx_IVR.war/scert-08.12.11.01.jar com/.../internal/ClassFinder.java 30 Likely 2/23/26 29 EG-Sphynx_IVR.war/avdbop-rt-08.12.11.01.jar com/.../runtime/ccxml/DbProxy.java 89 Likely 2/23/26 32 EG-Sphynx_IVR.war/scert-08.12.11.01.jar com/.../OutputGenerator.java 97 Likely 2/23/26 28 EG-Sphynx_IVR.war/avrest-rt-08.12.11.01.jar com/.../ccxml/Ws2Proxy.java 58 Likely 2/23/26
2 - Implementation error. Fix is approx. 6-50 lines of code. 1 day to fix. Description
Standard random number generators do not provide a sufficient amount of entropy when used for security purposes. Attackers can brute force the output of pseudorandom number generators such as rand(). Recommendations
If this random number is used where security is a concern, such as generating a session identifier or cryptographic key, use a trusted cryptographic random number generator instead. Instances found via Static ScanDescription35 EG-Sphynx_IVR.war/scert-08.12.11.01.jar com/.../runtime/GrammarRule.java 41 Unlikely 2/23/26 26 EG-Sphynx_IVR.war/scert-08.12.11.01.jar com/.../html/OutputGenerator.java 1152 Unlikely 2/23/26
A function call contains an HTTP response splitting flaw. Writing untrusted input into an HTTP header allows an attacker to manipulate the HTTP response rendered by the browser, leading to cache poisoning and cross-site scripting attacks. Recommendations
Remove unexpected carriage returns and line feeds from untrusted data used to construct an HTTP response. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible. Instances found via Static Scan
33 EG-Sphynx_IVR.war/scert-08.12.11.01.jar com/.../OutputGenerator.java 362 Likely 2/23/26 34 EG-Sphynx_IVR.war/scert-08.12.11.01.jar com/.../OutputGenerator.java 364 Likely 2/23/26 31 EG-Sphynx_IVR.war/scert-08.12.11.01.jar com/.../runtime/SCEServlet.java 1499 Likely 2/23/26
-

Comment