How to fix trust boundary violation in Checkmarx CxSAST reports

Many organizations use static code analyzers like Checkmarx CxSAST to find security flaws in applications. But to many developers, reports from Checkmarx CxSAST are viewed to create additional work by revealing vulnerabilities (both real ones and false positives), while offering no solution to advance their remediation. Who fixes the vulnerabilities in the report?

Trust boundary violation is a security vulnerability that occurs when an application combines trusted and untrusted data, blurring the line between what is trusted and what is untrusted. A trust boundary can be thought of as line drawn through a program. On one side of the line, data is untrusted. On the other side of the line, data is assumed to be trustworthy. By combining trusted and untrusted data in the same data structure, it becomes easier for unvalidated data to be mistakenly trusted.

How to remediate trust boundary violation depends on the programming language and the data structure, but here are some general guidelines:

  • Use allow-list input validation. This means that you check the user input against a list of allowed values or patterns, and reject any input that does not match. This can help make sure the untrusted data conform the expected formats before crossing the trust boundary.
  • Filter all user supplied input. This means that you check the user input against one or more block-lists, and rejects any input that matches. This approach requires extensive filtering to be effective, but might be suitable when the final uses of the untrusted data is uncertain.

Here are some examples of fixing trust boundary violation vulnerabilities:


var content = Request.Form["QueryContent"];
Session["UserQuery"] = Sanitizer.SanitizeUserInput(content);
...
ProcessUserQuery(Session["UserQuery"]);
                    

String content = request.getParameter("QueryContent");
session.setAttribute("UserQuery", Sanitizer.sanitizeUserInput(content));
...
processUserQuery(session.getAttribute("UserQuery"));
                    

What if there was a way to fix trust boundary violation automatically?

Lucent Sky AVM works like Checkmarx CxSAST and is able to pinpoint the exact location of a vulnerability. But unlinke SAST tools, Lucent Sky AVM also fixes the vulnerabilities it found. It generates "Instant Fixes" - code-based remediation that can be immediately placed in source code to fix the common vulnerabilities like cross-site scripting (XSS), SQL injection, and path manipulation.

Developers can review Instant Fixes and apply them individually or en masse, or integrate Lucent Sky AVM with a CI pipeline so vulnerabilities are checked, fixed, and tested automatically whenever new code is introduced.


Using Checkmarx CxSAST and Lucent Sky AVM together

While SAST tools like Checkmarx CxSAST only tell you where vulnerabilities are, Lucent Sky AVM will tell you where they are and how to fix them (and actually do it for you, if you like). Most SAST tools were designed to be used by security professionals, and calibrated to find large number of results, then relying on security experts to fine-tune it to weed out false positives. Lucent Sky AVM focuses on finding vulnerabilities that will cause real impact on the application's security, and only fix what can be fixed with confidence, based on settings set by you as well as your development and security teams. You can learn more about Lucent Sky AVM's remediation process.


Lucent Sky AVM + Checkmarx CxSAST = effortless compliance

If your organization's compliance requires the remediation of all results found by Checkmarx CxSAST (or results that fit a certain criteria, critical and high, for example), Lucent Sky AVM can be customized to find the same results while providing additional functional value - automatically fixing those vulnerabilities.


Actionable reporting

Many static code analysers are designed for and to be used by security professionals. This means they require expert users, and their assessments and outputs aren't developer friendly. Lucent Sky AVM offers clear reporting that caters to both security professionals and developers, providing both analysis results and Instant Fixes (code-based remediation to common vulnerabilities like cross-site scripting and SQL injection) that a non-expert can use to secure their code.

For organizations needing compliance reporting, Lucent Sky can help teams pass Checkmarx CxSAST scans and cut out the noise of false positives, while drastically reducing the time and effort required to secure an application.

Download a report comparison between Lucent Sky AVM and SAST tools to see the difference.


Fixing trust boundary violation in your Checkmarx CxSAST report can be done fast and efficiently

96% of applications have vulnerabilities — known security risks that bad actors can exploit. The main hurdle of implementing any security process is the actual remediation of vulnerabilities found. Developers and security engineers simply don't have the capacity to resolve vulnerabilities efficiently. That is why hundreds of companies and organizations have chosen Lucent Sky AVM to replace or supplement existing SAST tools, and help development teams actually fix vulnerabilities and accelerate their application security process.

To learn more about how Lucent Sky AVM can be used in combination with Checkmarx CxSAST in your environment, request a demo or get in touch.

Contact us
Try Lucent Sky AVM