Release: Merge back 2.47.3 into dev from: master-into-dev/2.47.3-2.48.0-dev#12675
Release: Merge back 2.47.3 into dev from: master-into-dev/2.47.3-2.48.0-dev#12675
Conversation
….48.0-dev Release: Merge back 2.47.2 into bugfix from: master-into-bugfix/2.47.2-2.48.0-dev
* PR template: adjust freeze wording * fix dead link
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
* Burp Enterprise renamed to Burp DAST * Burp Enterprise renamed to Burp DAST * Burp Enterprise renamed to Burp DAST
Co-authored-by: Jino Tesauro <jino@defectdojo.com>
Release: Merge release into master from: release/2.47.3
🔴 Risk threshold exceeded.This pull request contains multiple security findings related to potential information disclosure, including sensitive user information exposure in API filters, PII risks in Jira templates, and potential third-party content risks in documentation, with most findings classified as low-risk and non-blocking.
🔴 Configured Codepaths Edit in
|
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
Third-Party Content Risk in docs/content/en/working_with_findings/finding_priority.md
| Vulnerability | Third-Party Content Risk |
|---|---|
| Description | Embedding a YouTube video in documentation introduces a potential supply chain risk. While the risk is low in a documentation context, the iframe could potentially be a vector for content injection or tracking if the third-party domain is compromised. |
Reporter PII Exposure in dojo/templates/issue-trackers/jira_limited/jira-description.tpl
| Vulnerability | Reporter PII Exposure |
|---|---|
| Description | Jira description template now includes the reporter's full name and email address, which could expose personally identifiable information if the Jira issue is accessible to unauthorized parties. |
Sensitive User Information Disclosure in dojo/filters.py
| Vulnerability | Sensitive User Information Disclosure |
|---|---|
| Description | The ApiUserFilter exposes sensitive user attributes like is_active, is_superuser, and last_login. Without strict access controls, this could allow unauthorized gathering of user account metadata. |
django-DefectDojo/dojo/filters.py
Lines 85 to 91 in 53abfd7
User Enumeration via API Filter in dojo/api_v2/views.py
| Vulnerability | User Enumeration via API Filter |
|---|---|
| Description | The ApiUserFilter allows filtering user data by sensitive fields like username and email. If not properly secured, this could enable attackers to enumerate valid user accounts by observing filter responses, potentially aiding in targeted attacks. |
django-DefectDojo/dojo/api_v2/views.py
Lines 60 to 66 in 53abfd7
Finding Text Information Disclosure in dojo/jira_link/helper.py
| Vulnerability | Finding Text Information Disclosure |
|---|---|
| Description | The new get_jira_finding_text() function adds finding text to Jira descriptions, which could expose sensitive internal details or debugging information depending on the content of finding_text. |
django-DefectDojo/dojo/jira_link/helper.py
Lines 362 to 375 in 53abfd7
We've notified @mtesauro.
All finding details can be found in the DryRun Security Dashboard.
|
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
|
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Release triggered by
Maffooch