Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Release: Merge release into master from: release/2.46.1 #12402

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 8 commits into from
May 7, 2025

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented May 7, 2025

Release triggered by Maffooch

DefectDojo release bot and others added 8 commits May 5, 2025 17:16
….47.0-dev

Release: Merge back 2.46.0 into bugfix from: master-into-bugfix/2.46.0-2.47.0-dev
* tags: prevent validation from removing tags

* tags: prevent validation from removing tags smoke test

* tags: prevent validation from removing tags smoke test

* tags: prevent validation from removing tags remove ui test
Copy link

dryrunsecurity bot commented May 7, 2025

DryRun Security

🔴 Risk threshold exceeded.

This pull request contains multiple security considerations, including a sensitive file edit in a login template, potential risks in GitHub Actions workflow checkout, reduced error logging for Jira integration, and several code-level changes that could impact validation, logging, and information disclosure.

⚠️ Configured Codepaths Edit in dojo/templates/login/forgot_username.html
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
💭 Unconfirmed Findings (5)
Vulnerability Potential Arbitrary Ref Checkout Risk in GitHub Actions Workflow
Description Dynamic input parameter for checkout reference in .github/workflows/release-x-manual-helm-chart.yml could allow checking out unintended or malicious branches/tags if input validation is not strictly enforced
Vulnerability Reduced Error Visibility in Jira Integration Logging
Description Changing log level from error to debug in dojo/finding/views.py reduces visibility of potential issues in Jira integration, potentially suppressing critical error information
Vulnerability Potential Unhandled Tag Validation Edge Case
Description Added return statement in dojo/forms.py might bypass additional form-level validation, potentially allowing invalid tags to propagate
Vulnerability Potential Information Disclosure via Debug Logging
Description New debug log statement in dojo/utils.py could expose internal validation logic or sensitive input details if debug logs are accidentally enabled in production
Vulnerability Potential Dependency Version Disclosure
Description Publicly disclosing the exact version in components/package.json could help attackers understand which specific software version is in use, potentially aiding targeted vulnerability research

We've notified @mtesauro.


All finding details can be found in the DryRun Security Dashboard.

@Maffooch Maffooch merged commit 1b6e43b into master May 7, 2025
75 of 76 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants