Thanks to visit codestin.com
Credit goes to github.com

Skip to content

πŸŽ‰ Add Amazon Linux Security Center advisory to vulnid #12242

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Apr 17, 2025

Conversation

@github-actions github-actions bot added the settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR label Apr 14, 2025
Copy link

DryRun Security

This pull request reveals a potential security risk related to URL generation, where the presence of a && placeholder might enable URL manipulation if proper sanitization is not implemented.

πŸ’­ Unconfirmed Findings (1)
Vulnerability Potential URL Generation Mechanism Risk
Description The URL contains a && placeholder suggesting dynamic URL generation. This could potentially be exploited if URL generation is not properly sanitized, presenting a possible URL manipulation or injection vulnerability.

All finding details can be found in the DryRun Security Dashboard.

@manuel-sommer manuel-sommer changed the title πŸŽ‰ Add Amazon Linux Security Center aadvisory to vulnid πŸŽ‰ Add Amazon Linux Security Center advisory to vulnid Apr 14, 2025
@Maffooch Maffooch added this to the 2.45.2 milestone Apr 14, 2025
@Maffooch Maffooch requested a review from blakeaowens April 17, 2025 17:46
@Maffooch Maffooch merged commit bd59489 into DefectDojo:bugfix Apr 17, 2025
76 checks passed
@manuel-sommer manuel-sommer deleted the alas_vulnid branch April 18, 2025 07:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants