Skip to content

Release: Merge release into master from: release/2.50.2#13173

Merged
rossops merged 21 commits intomasterfrom
release/2.50.2
Sep 15, 2025
Merged

Release: Merge release into master from: release/2.50.2#13173
rossops merged 21 commits intomasterfrom
release/2.50.2

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

Release triggered by rossops

DefectDojo release bot and others added 20 commits September 8, 2025 14:55
….51.0-dev

Release: Merge back 2.50.1 into bugfix from: master-into-bugfix/2.50.1-2.51.0-dev
* Allow enabling Django Debug Toolbar via env variable

* Allow enabling Django Debug Toolbar via env variable

* debugtoolbar: fix collectstatic
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
* 🎉 Add fix_available information to mend #12633

* fix
* add new fields to generic parser

* add test file

* fix missing trailing comma

* modify csv parser and add csv test file

* remove spaces from blank lines

* update parser documentation
bulk edit: add None check on JIRA sync check
Github Vulnerability Parser: Update docs to generate correct schema
@dryrunsecurity
Copy link
Copy Markdown

dryrunsecurity Bot commented Sep 15, 2025

DryRun Security

🔴 Risk threshold exceeded.

This pull request includes a flagged sensitive edit to dojo/jira_link/helper.py. It also introduces a potential denial‑of‑service in dojo/tools/generic/csv_parser.py (lines 81–106) where CVSSV4_score and kev_date are converted without proper error handling, so malformed values can raise ValueError/ParserError and crash the import process.

🔴 Configured Codepaths Edit in dojo/jira_link/helper.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
Denial of Service via Malformed CSV Input in dojo/tools/generic/csv_parser.py
Vulnerability Denial of Service via Malformed CSV Input
Description The CSV parser in dojo/tools/generic/csv_parser.py attempts to convert CVSSV4_score to a float and kev_date to a date object without proper error handling. Malformed input in these fields (e.g., non-numeric string for score, invalid date string for date) will cause unhandled ValueError or ParserError exceptions, leading to a crash of the import process.

if len(cvss_objects) > 0:
finding.cvssv3 = cvss_objects[0].clean_vector()
if "CVSSV4" in row:
cvss4_objects = cvss_parser.parse_cvss_from_text(row["CVSSV4"])
if len(cvss4_objects) > 0:
finding.cvssv4 = cvss4_objects[0].clean_vector()
if "CVSSV4_score" in row:
finding.cvssv4_score = float(row["CVSSV4_score"])
if "kev_date" in row:
finding.kev_date = parse(row["kev_date"])
if "known_exploited" in row:
finding.known_exploited = bool(row["known_exploited"])
if "ransomware_used" in row:
finding.ransomware_used = bool(row["ransomware_used"])
if "fix_available" in row:
finding.fix_available = bool(row["fix_available"])
# manage endpoints
if "Url" in row:
finding.unsaved_endpoints = [

We've notified @mtesauro.


All finding details can be found in the DryRun Security Dashboard.

@rossops rossops closed this Sep 15, 2025
@rossops rossops reopened this Sep 15, 2025
@github-actions github-actions Bot added docker settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR docs unittests ui labels Sep 15, 2025
@rossops rossops merged commit 68821a8 into master Sep 15, 2025
86 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

docker docs helm parser settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR ui unittests

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants