Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Release: Merge release into master from: release/2.45.3 #12324

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 14 commits into from
Apr 28, 2025
Merged

Conversation

github-actions[bot]
Copy link
Contributor

Release triggered by rossops

DefectDojo release bot and others added 14 commits April 22, 2025 02:44
….46.0-dev

Release: Merge back 2.45.2 into bugfix from: master-into-bugfix/2.45.2-2.46.0-dev
* add examples_of_use content

* reweight sidebar

---------

Co-authored-by: Paul Osinski <[email protected]>
* Reimport: Special statuses should be respected from reports

* Fixing ruff

* Update unittests/tools/test_checkmarx_one_parser.py

Co-authored-by: Charles Neill <[email protected]>

* Use the correct dict for statuses

---------

Co-authored-by: Charles Neill <[email protected]>
Co-authored-by: Paul Osinski <[email protected]>
* sla: parse finding.date implicitly

* add comment

* move import

* add unit test
* fortify: handle suppressed findings

* ruff

* fortify: handle suppressed findings docs

* fortify: handle suppressed findings docs
* 2.45.2 pro changelog

* add nextgen finding enhancements documentation

* Correcting messy conflict resolution

* Update docs/content/en/changelog/changelog.md

Co-authored-by: Charles Neill <[email protected]>

* Update docs/content/en/working_with_findings/finding_priority.md

Co-authored-by: Charles Neill <[email protected]>

* Update finding_priority.md

---------

Co-authored-by: Paul Osinski <[email protected]>
Co-authored-by: Cody Maffucci <[email protected]>
Co-authored-by: Charles Neill <[email protected]>
@rossops rossops closed this Apr 28, 2025
@rossops rossops reopened this Apr 28, 2025
@github-actions github-actions bot added settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR docs unittests ui parser helm labels Apr 28, 2025
Copy link

dryrunsecurity bot commented Apr 28, 2025

DryRun Security

🔴 Risk threshold exceeded.

This pull request involves sensitive edits to a template tag file, potential security improvements in finding status updates and date parsing, and proactive measures to mitigate HTML injection and XSS risks, while also revealing some details about DefectDojo Pro's prioritization methodology.

⚠️ Configured Codepaths Edit in dojo/templatetags/display_tags.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
⚠️ Configured Codepaths Edit in dojo/templatetags/display_tags.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
💭 Unconfirmed Findings (5)
Vulnerability Potential Information Disclosure of Prioritization Methodology
Description Detailed documentation reveals exact calculation method for finding priority and risk, which could help an attacker understand how DefectDojo Pro assesses security findings. Located in docs/content/en/working_with_findings/finding_priority.md.
Vulnerability Potential Race Condition in Finding Status Updates
Description Added code mitigates a potential race condition where status changes during reimport could be inadvertently discarded. Located in dojo/importers/default_reimporter.py.
Vulnerability Potential Unsafe Date Parsing
Description Use of dateutil.parser.parse() on untrusted input could lead to unexpected date interpretations and potential manipulation of date-related logic. Located in dojo/models.py.
Vulnerability Potential Cross-Site Scripting (XSS) Risk with mark_safe()
Description mark_safe() function bypasses Django's automatic HTML escaping, potentially introducing XSS vulnerabilities if JSON-dumped values contain user-controlled or untrusted input. Located in dojo/templatetags/as_json.py.
Vulnerability Potential HTML Injection Mitigation
Description Introduction of as_json_no_html_esc filter suggests proactive measures to prevent HTML injection by ensuring proper escaping of dynamic content in webhook notifications. Found in multiple webhook template files.

We've notified @mtesauro.


All finding details can be found in the DryRun Security Dashboard.

@rossops rossops merged commit 477583e into master Apr 28, 2025
75 of 76 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs helm parser settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR ui unittests
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants