Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Release: Merge back 2.45.1 into dev from: master-into-dev/2.45.1-2.46.0-dev #12239

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 36 commits into from
Apr 14, 2025

Conversation

github-actions[bot]
Copy link
Contributor

Release triggered by rossops

DefectDojo release bot and others added 30 commits March 31, 2025 16:01
….45.0-dev

Release: Merge back 2.44.4 into bugfix from: master-into-bugfix/2.44.4-2.45.0-dev
* jira docs: add ssl certificate instructions

* Update docs/content/en/share_your_findings/jira_integration/connect_to_jira.md

---------

Co-authored-by: Cody Maffucci <[email protected]>
* running in production should change aes key

* running in production should change aes key

* add instructions on how to generate AES key

* adjust celery text
* sysdig: support new csv format

* sysdig: support new json format

* sysdig: linting

* add scan file

* sysdig: refactor into two parsers

* sysdig: refactor into two parsers

* sysdig: reorganize files to make test parsers happy

* sysdig: reorganize files to make test parsers happy

* sysdig: reorganize files to make test parsers happy

* Make tests happy

* sysdig: reorganize files to make test parsers happy

* sysdig: reorganize files to make test parsers happy

* sysdig: reorganize files to make test parsers happy

* sysdig: reorganize files to make test parsers happy
* generic parser: handle is_mitigated and mitigated

* generic parser: handle is_mitigated and mitigated
* wiz: handle mitigated timestamps

* wiz: handle mitigated timestamps

* wiz: handle mitigated timestamps

* wiz: handle mitigated timestamps

* wiz: failsafe

* wiz: failsafe

* finalize datetime parsing format
….46.0-dev

Release: Merge back 2.45.0 into bugfix from: master-into-bugfix/2.45.0-2.46.0-dev
Co-authored-by: Cody Maffucci <[email protected]>
* 🔨 Rework RustyHog to fix #10584

* Update docs/content/en/connecting_your_tools/parsers/file/rusty_hog.md

Co-authored-by: Cody Maffucci <[email protected]>

* update

---------

Co-authored-by: Cody Maffucci <[email protected]>
* wiz scan: handle more fields

* wiz scan: handle more fields
* immuniweb json: domains

* immuniweb json

* immuniweb json

* immuniweb json
* 🎉 Add cisco security advisory to vulnid

* fix
* Updated Anchore Enterprise Documentation to fit parser. Note Anchore Engine is EOL replacement is Anchore Enterprise

* Fix missing test link in documentation and bumped up chart version

* Update helm/defectdojo/Chart.yaml

Co-authored-by: Cody Maffucci <[email protected]>

* Update anchore_engine.md

---------

Co-authored-by: valentijnscholten <[email protected]>
Co-authored-by: Cody Maffucci <[email protected]>
* h1: parse main_state

* h1: parse main_state

* h1: parse main_state

* h1: parse main_state

* h1: parse main_state
* changelog 2.45.0

* Update docs/content/en/changelog/changelog.md

Co-authored-by: Charles Neill <[email protected]>

---------

Co-authored-by: Paul Osinski <[email protected]>
Co-authored-by: Cody Maffucci <[email protected]>
Co-authored-by: Charles Neill <[email protected]>
manuel-sommer and others added 4 commits April 12, 2025 00:14
* 💄 🪲 Fix Aqua parser severity justification

* update

* update
Release: Merge release into master from: release/2.45.1
Copy link
Contributor Author

This pull request has conflicts, please resolve those before we can evaluate the pull request.

Copy link

dryrunsecurity bot commented Apr 14, 2025

DryRun Security

🔴 Risk threshold exceeded.

This pull request contains sensitive edits to critical files and introduces several potential security vulnerabilities, including token deletion risks, hardcoded encryption key exposure, and parser input validation weaknesses that could compromise system integrity and data security.

⚠️ Configured Codepaths Edit in dojo/finding/views.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
⚠️ Configured Codepaths Edit in dojo/templates/dojo/engagement_pdf_report.html
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
💭 Unconfirmed Findings (5)
Vulnerability Token Deletion Vulnerability
Description Potential security issue in dojo/finding/views.py where explicit size validation before token deletion is removed, which could allow token reuse, bypass access controls, or lead to unintended token invalidation.
Vulnerability Information Exposure in Documentation
Description Security concern in documentation example using HTTP protocol URL, which risks transmitting sensitive data insecurely, and potential parsing inconsistencies due to flexible date parsing.
Vulnerability Hardcoded Encryption Key Risk
Description Critical security vulnerability involving a default AES256 encryption key used for API key and credential encryption, which poses significant risk if not replaced in production environments.
Vulnerability Parser Input Validation Weaknesses
Description Multiple parsers (CSV, JSON, ImmuniWeb) demonstrate flexible and potentially unsafe parsing methods with limited input validation, risking data integrity and potential security exploits.
Vulnerability Potential Information Disclosure
Description Parsers may expose sensitive system and package metadata, with risks of revealing partial passwords or confidential details within scan results.

We've notified @mtesauro.


All finding details can be found in the DryRun Security Dashboard.

Copy link
Contributor Author

Conflicts have been resolved. A maintainer will review the pull request shortly.

1 similar comment
Copy link
Contributor Author

Conflicts have been resolved. A maintainer will review the pull request shortly.

@github-actions github-actions bot added settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR docs unittests ui parser helm and removed conflicts-detected labels Apr 14, 2025
@rossops rossops merged commit ed2b172 into dev Apr 14, 2025
78 of 79 checks passed
@rossops rossops deleted the master-into-dev/2.45.1-2.46.0-dev branch April 14, 2025 17:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs helm parser settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR ui unittests
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants