YUDDHA Autonomous Defender KAVACH Patches Critical SQL Injection in /rest/user/login Endpoint
The YUDDHA platform's autonomous security system, KAVACH, has automatically identified and patched a critical SQL injection vulnerability in a live application. The flaw was located in the `/rest/user/login` endpoint, a core authentication function, and was verified using the Mistral model and sandbox testing. The vulnerability, classified under OWASP A03:2021 - Injection, was exploitable with a simple proof-of-concept payload (`' OR 1=1 --`), posing a severe risk of unauthorized access.
The patch was applied directly to the `server.ts` source code file, confirming the issue was rooted in the application's real source code from its repository. The autonomous system's detection and remediation process bypassed traditional human-led security workflows, highlighting a shift towards AI-driven, continuous defense mechanisms. The target application, `juiceshop`, was running on port 3000, and the fix specifically addressed the insecure handling of user input in the login function.
This event underscores the persistent and high-severity threat of injection attacks on fundamental services like user authentication. The successful autonomous patch by KAVACH demonstrates a potential new operational paradigm for application security, where critical vulnerabilities can be identified and resolved in near real-time, directly from source code analysis, reducing the window of exposure for live systems.