-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Release: Merge back 2.45.1 into dev from: master-into-dev/2.45.1-2.46.0-dev #12239
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
….45.0-dev Release: Merge back 2.44.4 into bugfix from: master-into-bugfix/2.44.4-2.45.0-dev
* jira docs: add ssl certificate instructions * Update docs/content/en/share_your_findings/jira_integration/connect_to_jira.md --------- Co-authored-by: Cody Maffucci <[email protected]>
* running in production should change aes key * running in production should change aes key * add instructions on how to generate AES key * adjust celery text
* sysdig: support new csv format * sysdig: support new json format * sysdig: linting * add scan file * sysdig: refactor into two parsers * sysdig: refactor into two parsers * sysdig: reorganize files to make test parsers happy * sysdig: reorganize files to make test parsers happy * sysdig: reorganize files to make test parsers happy * Make tests happy * sysdig: reorganize files to make test parsers happy * sysdig: reorganize files to make test parsers happy * sysdig: reorganize files to make test parsers happy * sysdig: reorganize files to make test parsers happy
* generic parser: handle is_mitigated and mitigated * generic parser: handle is_mitigated and mitigated
* wiz: handle mitigated timestamps * wiz: handle mitigated timestamps * wiz: handle mitigated timestamps * wiz: handle mitigated timestamps * wiz: failsafe * wiz: failsafe * finalize datetime parsing format
….46.0-dev Release: Merge back 2.45.0 into bugfix from: master-into-bugfix/2.45.0-2.46.0-dev
Co-authored-by: Cody Maffucci <[email protected]>
* 🔨 Rework RustyHog to fix #10584 * Update docs/content/en/connecting_your_tools/parsers/file/rusty_hog.md Co-authored-by: Cody Maffucci <[email protected]> * update --------- Co-authored-by: Cody Maffucci <[email protected]>
* wiz scan: handle more fields * wiz scan: handle more fields
* immuniweb json: domains * immuniweb json * immuniweb json * immuniweb json
* 🎉 Add cisco security advisory to vulnid * fix
* Updated Anchore Enterprise Documentation to fit parser. Note Anchore Engine is EOL replacement is Anchore Enterprise * Fix missing test link in documentation and bumped up chart version * Update helm/defectdojo/Chart.yaml Co-authored-by: Cody Maffucci <[email protected]> * Update anchore_engine.md --------- Co-authored-by: valentijnscholten <[email protected]> Co-authored-by: Cody Maffucci <[email protected]>
* h1: parse main_state * h1: parse main_state * h1: parse main_state * h1: parse main_state * h1: parse main_state
* changelog 2.45.0 * Update docs/content/en/changelog/changelog.md Co-authored-by: Charles Neill <[email protected]> --------- Co-authored-by: Paul Osinski <[email protected]> Co-authored-by: Cody Maffucci <[email protected]> Co-authored-by: Charles Neill <[email protected]>
* 💄 🪲 Fix Aqua parser severity justification * update * update
Release: Merge release into master from: release/2.45.1
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
🔴 Risk threshold exceeded.This pull request contains sensitive edits to critical files and introduces several potential security vulnerabilities, including token deletion risks, hardcoded encryption key exposure, and parser input validation weaknesses that could compromise system integrity and data security.
|
Vulnerability | Configured Codepaths Edit |
---|---|
Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml . |
⚠️ Configured Codepaths Edit in dojo/templates/dojo/engagement_pdf_report.html
Vulnerability | Configured Codepaths Edit |
---|---|
Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml . |
💭 Unconfirmed Findings (5)
Vulnerability | Token Deletion Vulnerability |
---|---|
Description | Potential security issue in dojo/finding/views.py where explicit size validation before token deletion is removed, which could allow token reuse, bypass access controls, or lead to unintended token invalidation. |
Vulnerability | Information Exposure in Documentation |
---|---|
Description | Security concern in documentation example using HTTP protocol URL, which risks transmitting sensitive data insecurely, and potential parsing inconsistencies due to flexible date parsing. |
Vulnerability | Hardcoded Encryption Key Risk |
---|---|
Description | Critical security vulnerability involving a default AES256 encryption key used for API key and credential encryption, which poses significant risk if not replaced in production environments. |
Vulnerability | Parser Input Validation Weaknesses |
---|---|
Description | Multiple parsers (CSV, JSON, ImmuniWeb) demonstrate flexible and potentially unsafe parsing methods with limited input validation, risking data integrity and potential security exploits. |
Vulnerability | Potential Information Disclosure |
---|---|
Description | Parsers may expose sensitive system and package metadata, with risks of revealing partial passwords or confidential details within scan results. |
We've notified @mtesauro.
All finding details can be found in the DryRun Security Dashboard.
Conflicts have been resolved. A maintainer will review the pull request shortly. |
1 similar comment
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Release triggered by
rossops