Release: Merge back 2.50.1 into dev from: master-into-dev/2.50.1-2.51.0-dev#13138
Release: Merge back 2.50.1 into dev from: master-into-dev/2.50.1-2.51.0-dev#13138
Conversation
….51.0-dev Release: Merge back 2.50.0 into bugfix from: master-into-bugfix/2.50.0-2.51.0-dev
* 🎉 Add fix_available to KrakenDAudit * Update settings.dist.py
* 🎉 Add number of fix_available information to test view * Update dojo/templates/dojo/view_test.html Co-authored-by: valentijnscholten <valentijnscholten@gmail.com> --------- Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> Co-authored-by: valentijnscholten <valentijnscholten@gmail.com>
Co-authored-by: Jino Tesauro <jino@defectdojo.com>
* add about_deduplication png * update changelog 2.50 * update changelog 2.50 --------- Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
* semgrep pro: parse sast finding * update docs
* 🐛 Implement Wazuh v4.8 * update unittests * update * fix * fix * fix * update unittests * update * fix unittest * review
* 🐛 Fix finding_group view * ruff * finding group view: add basic UI tests --------- Co-authored-by: Valentijn Scholten <valentijnscholten@gmail.com>
fix default order to finding_groups
Release: Merge release into master from: release/2.50.1
🔴 Risk threshold exceeded.This pull request modifies multiple sensitive codepaths (views, templates, serializers, forms, and a docker entrypoint) flagged by the scanner and contains several non-blocking findings. Specific issues to review: potential XSS in dojo/tools/semgrep_pro/parser.py where external JSON is interpolated without sanitization, a possible CSV-based DoS in dojo/tools/qualys_hacker_guardian/parser.py due to an extremely large csv.field_size_limit, and an information-disclosure concern in dojo/forms.py that reveals users' SSO status.
🔴 Configured Codepaths Edit in
|
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/templates/dojo/view_test.html
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding_group/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding_group/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in docker/entrypoint-uwsgi.sh
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/api_v2/serializers.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding_group/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/forms.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/templates/dojo/view_test.html
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/test/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/user/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/api_v2/serializers.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/test/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/test/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding_group/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/user/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🟡 Potential Cross-Site Scripting in dojo/tools/semgrep_pro/parser.py
| Vulnerability | Potential Cross-Site Scripting |
|---|---|
| Description | File dojo/tools/semgrep_pro/parser.py directly loads external JSON via json.load(filename) and then interpolates numerous fields from that JSON into Finding attributes (description, mitigation, references, impact, etc.) without any sanitization or escaping. Examples in the patch: desc += f"Message: {item['rule_message']}\n\n" (in get_description), mitigation_parts.append(f"Suggested Fix:\n |
django-DefectDojo/dojo/tools/semgrep_pro/parser.py
Lines 1 to 195 in bc7bf32
Denial of Service (DoS) via Excessive CSV Field Size in dojo/tools/qualys_hacker_guardian/parser.py
| Vulnerability | Denial of Service (DoS) via Excessive CSV Field Size |
|---|---|
| Description | The code sets the csv.field_size_limit to an extremely large value (sys.maxsize / 10). This allows a single field within a CSV file to consume an arbitrary amount of memory, limited only by the system's available RAM. An attacker can craft a malicious CSV file with a single, very long field, causing the server to attempt to allocate an excessive amount of memory during parsing, leading to memory exhaustion and a Denial of Service (DoS). |
django-DefectDojo/dojo/tools/qualys_hacker_guardian/parser.py
Lines 89 to 95 in bc7bf32
Information Disclosure in dojo/forms.py
| Vulnerability | Information Disclosure |
|---|---|
| Description | The UserContactInfoForm displays a help text 'This user is authorized through SSO, and does not have a password to reset' if the user being edited or viewed does not have a usable password (typically indicating SSO authentication). This information is exposed on the user's profile page (/profile) and the user edit page (/user/<uid>/edit). While the view_profile page is for a user to view their own profile, the edit_user page allows privileged users to edit other users' profiles. The edit_user function has a permission check (user_has_permission_or_403(request, 'dojo.change_user')). This means any user with dojo.change_user permission can view this information for any other user, including administrators. Knowing that a high-privileged user authenticates via SSO could be valuable for an attacker in a social engineering or targeted attack, as it narrows down potential attack vectors (e.g., no password brute-forcing, focus on phishing SSO credentials). |
django-DefectDojo/dojo/forms.py
Lines 2388 to 2401 in bc7bf32
We've notified @mtesauro.
All finding details can be found in the DryRun Security Dashboard.
Release triggered by
rossops