Sonar's latest blog posts
Building Confidence and Trust in AI-Generated Code
To tackle the accountability and ownership challenge accompanying AI-generated code, we are introducing Sonar AI Code Assurance
![https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/0bd6c0bc-c921-485b-8570-8de7e1384983/AI%20Code%20Assurance_square-index%402x.png](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/0bd6c0bc-c921-485b-8570-8de7e1384983/AI%20Code%20Assurance_square-index%402x.png?w=1080&h=1080&auto=format&fit=crop)
![We recently found a vulnerability in Django that allows us to disclose sensitive information. Let’s review the root cause, exploiting technique, and patch.](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/d3da8074-dd9f-4c99-9d7e-6001cd3148d3/cover-707d5403-6d1c-4532-bc35-7e03c4e44177_django-vulnerability_blog-hero%25402x.png?w=325&h=200&auto=format&fit=crop)
Disclosing information with a side-channel in Django
We recently found a vulnerability in Django that allows us to disclose sensitive information. Let’s review the root cause, exploiting technique, and patch.
Read Blog post >
![We recently discovered a Prototype Pollution vulnerability in Blitz.js leading to Remote Code Execution. Learn about this bug class and how to avoid it in your code!](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/49864ed0-3025-46f8-9dd0-26e0205e9592/cover-9400fc20-8a70-424a-b1ab-6fa8bff9b8cc_Blitz-JS_Vulnerability%25402x.png?w=325&h=200&auto=format&fit=crop)
Remote Code Execution via Prototype Pollution in Blitz.js
We recently discovered a Prototype Pollution vulnerability in Blitz.js leading to Remote Code Execution. Learn about this bug class and how to avoid it in your code!
Read Blog post >
![We discovered a vulnerability in Zimbra Enterprise Email that allows an unauthenticated, remote attacker fully take over Zimbra instances via a flaw in unrar.](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/f8f5e822-b341-41c3-ac1d-14b8da1ff297/cover-57fb4ac4-6a48-499d-bac5-5bb7fa5eb17f_Zimbra_Blog%2BHeader%25402x.png?w=325&h=200&auto=format&fit=crop)
Unrar Path Traversal Vulnerability affects Zimbra Mail
We discovered a vulnerability in Zimbra Enterprise Email that allows an unauthenticated, remote attacker fully take over Zimbra instances via a flaw in unrar.
Read Blog post >
![We discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/22f94cfb-b291-47d7-a281-9a816efd7bb0/cover-9c8d0d36-05c6-4114-85cc-19263bc3230e_Zimbra%2B2nd%2Bencounter%25402x.png?w=325&h=200&auto=format&fit=crop)
Zimbra Email - Stealing Clear-Text Credentials via Memcache injection
We discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.
Read Blog post >
![https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/29c1cfd3-6f16-4cf9-8a2f-ab8784b441b4/Sonars%20Analysis%20Performance%20Targets_blog%20header.png](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/29c1cfd3-6f16-4cf9-8a2f-ab8784b441b4/Sonars%20Analysis%20Performance%20Targets_blog%20header.png?w=325&h=200&auto=format&fit=crop)
Sonar’s analysis performance targets
We've finally defined our own performance goals for analysis - so that we're no longer subjecting ourselves to apples-to-oranges comparisons with tools that may not have the same goals or outcomes. Now, we can clearly state what you can expect from analysis, and how long analysis of a project should take under standardized conditions.
Read Blog post >
![We discovered vulnerabilities in Horde Webmail that allow an attacker to execute arbitrary code on Horde instances by having a victim open an email](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/b5653f98-8350-4e11-96ca-055c4b6d1e5a/cover-0a359c54-1bf6-4318-b255-5e9ffd2bba1b_RD-154%2BHorde%2BStored%2BXSS%25402x.png?w=325&h=200&auto=format&fit=crop)
Horde Webmail - Remote Code Execution via Email
We discovered vulnerabilities in Horde Webmail that allow an attacker to execute arbitrary code on Horde instances by having a victim open an email
Read Blog post >
![We recently discovered two critical vulnerabilities in the IT monitoring dashboard Icinga Web. Let’s review their respective root cause and their patches!](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/44ff6c99-894f-4ff7-a135-f468c08bdd70/cover-b6543c39-9080-4011-90ab-e078bb92dcdd_RD-165%2BIcingaweb2%25402x.png?w=325&h=200&auto=format&fit=crop)
Path Traversal Vulnerabilities in Icinga Web
We recently discovered two critical vulnerabilities in the IT monitoring dashboard Icinga Web. Let’s review their respective root cause and their patches!
Read Blog post >
![VS Code has been gaining popularity for C and C++ development. We are happy to announce that finally, we will be able to help you write clean C and C++ code in VS Code.](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/f0f7a1b4-443d-46b8-8836-b4348948699c/cover-e2a249cc-1f9b-4afa-b40d-5ab1ffedf1bf_02_SL_c-cpp-vscode_Blog-Social%25402x.png?w=325&h=200&auto=format&fit=crop)
A C&C++ tour of SonarQube for IDE: Visual Studio Code
VS Code has been gaining popularity for C and C++ development. We are happy to announce that finally, we will be able to help you write clean C and C++ code in VS Code.
Read Blog post >
![We recently discovered a critical code vulnerability in RainLoop Webmail that allows attackers to steal all emails by sending a malicious mail.](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/0c021d54-82b7-4005-9dda-a60131458bbb/cover-35479e64-521a-475d-8547-3423ee78ec5a_RainLoop%2BWebMail%2BStored%2BXSS%25402x.png?w=325&h=200&auto=format&fit=crop)
RainLoop Webmail - Emails at Risk due to Code Flaw
We recently discovered a critical code vulnerability in RainLoop Webmail that allows attackers to steal all emails by sending a malicious mail.
Read Blog post >
![For the second time in a year, we identified critical code vulnerabilities in a central component of the PHP supply chain. Let's dive into it!](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/c1f194e6-c628-4642-9199-7f0daa232728/cover-05529a53-c15f-4234-9be4-ad6ad769fed5_RD-137%2BPHP%2BSupply%2BChain%2BAttack%2Bon%2BPEAR%25402x.png?w=325&h=200&auto=format&fit=crop)
PHP Supply Chain Attack on PEAR
For the second time in a year, we identified critical code vulnerabilities in a central component of the PHP supply chain. Let's dive into it!
Read Blog post >
![The norm for setting up your cloud-native app infrastructure is quickly becoming Infrastructure as Code (IaC). In this blog, we’ll cover how Sonar is the solution for safeguarding your Ia...](https://assets-eu-01.kc-usercontent.com:443/a8c9572d-fe62-0144-0642-b3f31f575091/574cfd37-e4ba-4a69-942a-ca34f731d155/cover-230ef5ab-4143-4f2e-80ce-c0bea7b5c674_Infrastructure%2Bas%2BCode%25402x.png?w=325&h=200&auto=format&fit=crop)
Clean Your Infrastructure Code with Sonar
The norm for setting up your cloud-native app infrastructure is quickly becoming Infrastructure as Code (IaC). In this blog, we’ll cover how Sonar is the solution for safeguarding your IaC invoked infrastructure.
Read Blog post >