1. Home
  2. Web App Vulnerabilities
  3. How to remediate – Salesforce.com Settings

How to remediate – Salesforce.com Settings

1. Introduction

The Salesforce.com Settings vulnerability concerns the configuration of credentials used for connecting to Salesforce.com. This is important because misconfigured settings can allow unauthorised access to sensitive data within a Salesforce instance. Systems affected are typically those using scanning tools that integrate with Salesforce.com, potentially impacting confidentiality, integrity and availability of Salesforce data.

2. Technical Explanation

This vulnerability relates to the initialisation of credentials used by the scanner for Salesforce access. The script requires manual configuration of these credentials within the scan policy settings. An attacker could exploit this if a scan policy is configured with weak or default credentials, allowing them to gain access to the Salesforce instance through the scanning tool. There are no known CVEs associated with this specific configuration issue.

  • Root cause: The script requires explicit credential setting within the scan policy interface.
  • Exploit mechanism: An attacker gains access to a system running scans against Salesforce using compromised credentials configured in the scan policy.
  • Scope: Affected platforms are those running scanning tools with Salesforce integration, and specifically the configuration of the ‘Preferences -> Salesforce.com Settings’ section within the scan policy.

3. Detection and Assessment

Confirming vulnerability involves checking the configured credentials in your scan policies. A quick check is to review recent scans for any errors related to authentication failures. A thorough method is to examine the ‘Preferences -> Salesforce.com Settings’ section of each active scan policy.

  • Quick checks: Review scan logs for failed login attempts from the scanner user.
  • Scanning: No specific signature IDs are available, as this relates to configuration rather than a software flaw.
  • Logs and evidence: Examine scan policy configurations for any default or easily guessable credentials.

4. Solution / Remediation Steps

The solution involves ensuring strong, unique credentials are used for Salesforce access within your scan policy configuration.

4.1 Preparation

  • Dependencies: Ensure you have administrative access to the scanning tool. Roll back is possible by restoring the backed-up scan policy.
  • A change window may be required depending on your organisation’s procedures, and approval from a security team lead might be needed.

4.2 Implementation

  1. Step 1: Log in to the scanning tool as an administrator.
  2. Step 2: Navigate to ‘Preferences -> Salesforce.com Settings’ within your scan policy configuration.
  3. Step 3: Update the username and password fields with strong, unique credentials.
  4. Step 4: Save the updated scan policy.

4.3 Config or Code Example

Before

Username: admin
Password: password123

After

Username: secure_salesforce_user
Password: StrongUniquePassword!

4.4 Security Practices Relevant to This Vulnerability

List only practices that directly address this vulnerability type. Use neutral wording and examples instead of fixed advice. For example: least privilege, input validation, safe defaults, secure headers, patch cadence. If a practice does not apply, do not include it.

  • Practice 1: Least privilege – grant the scanning tool user only the minimum necessary permissions within Salesforce to perform its function.
  • Practice 2: Strong password policies – enforce strong, unique passwords for all accounts, including those used by automated tools like scanners.

4.5 Automation (Optional)

5. Verification / Validation

Confirming the fix involves verifying that strong credentials are configured and that scans complete successfully without authentication errors.

  • Post-fix check: Navigate to ‘Preferences -> Salesforce.com Settings’ in your scan policy and confirm the username is not ‘admin’ or a similar default, and the password meets complexity requirements.
  • Re-test: Run a test scan against Salesforce and verify it completes without authentication errors.
  • Smoke test: Confirm that scans are still running as expected and data is being collected from Salesforce.
  • Monitoring: Monitor scan logs for any failed login attempts or unexpected errors related to Salesforce access.

6. Preventive Measures and Monitoring

Suggest only measures that are relevant to the vulnerability type. Use “for example” to keep advice conditional, not prescriptive.

  • Baselines: Update your security baseline or policy to include requirements for strong credentials in scan tool configurations.
  • Pipelines: Incorporate checks into your CI/CD pipeline to validate that scan policies do not contain default or weak credentials.
  • Asset and patch process: Review scan tool configurations regularly as part of a broader asset management process.

7. Risks, Side Effects, and Roll Back

  • Roll back: Restore the backed-up scan policy if incorrect credentials are entered, preventing successful scans.

8. References and Resources

  • Vendor advisory or bulletin: Refer to your scanning tool vendor’s documentation for Salesforce integration best practices.
  • NVD or CVE entry: No specific NVD or CVE entry exists for this configuration issue.
  • Product or platform documentation relevant to the fix: Consult the Salesforce documentation on user permissions and API access controls.
Updated on December 27, 2025

Was this article helpful?

Related Articles