Release: Merge back 2.50.2 into dev from: master-into-dev/2.50.2-2.51.0-dev#13240
Release: Merge back 2.50.2 into dev from: master-into-dev/2.50.2-2.51.0-dev#13240
Conversation
….51.0-dev Release: Merge back 2.50.2 into bugfix from: master-into-bugfix/2.50.2-2.51.0-dev
* product grade: only update product if grade has changed * product grade: only update product if grade has changed
* test filter on last_status_update * test filter on last_status_update * make datetimes timezone aware
* 💄 Update Wazuh v4.8 * ruff * update * update * Update dojo/tools/wazuh/v4_8.py Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> --------- Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>
* bulk edit: updae under_review flag * bulk edit: updae under_review flag
* add sticker link * update changelog 2.50.2 * update generic findings documentation --------- Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
Tags: Remove duplicates in edit forms
Release: Merge release into master from: release/2.50.3
🔴 Risk threshold exceeded.This pull request modifies multiple sensitive codepaths (files under dojo/ such as utils.py, forms.py, filters.py, engagement/views.py, finding/views.py, metrics/utils.py, test/views.py) flagged by the configured codepaths scanner, and it contains two concrete risks: a code‑injection vulnerability where the user‑editable System_Settings.product_grade CharField is passed to asteval in calculate_grade, and an unbounded tag‑creation/resource exhaustion risk in the TagField implementation; please review these changes carefully or update .dryrunsecurity.yaml to explicitly allow the edits.
🔴 Configured Codepaths Edit in
|
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/engagement/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/filters.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/forms.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/metrics/utils.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/test/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/utils.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/filters.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/forms.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/metrics/utils.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/utils.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
Resource Exhaustion via Unbounded Tag Creation in dojo/forms.py
| Vulnerability | Resource Exhaustion via Unbounded Tag Creation |
|---|---|
| Description | The TagField implementation, which uses django-tagulous, lacks explicit limits on the length of individual tags and the total number of unique tags that can be created. While a tag_validator exists to prevent certain characters, it does not address the core issue of resource consumption. This allows a malicious user to create an excessive number of long, unique tags, leading to potential database bloat, performance degradation, and ultimately, resource exhaustion or denial of service. |
django-DefectDojo/dojo/forms.py
Lines 343 to 352 in bb35fe8
Code Injection via User-Editable product_grade Field in dojo/utils.py
| Vulnerability | Code Injection via User-Editable product_grade Field |
|---|---|
| Description | The product_grade field, which is directly used in an aeval call within the calculate_grade function, is a user-editable CharField in the System_Settings model. This means an authenticated administrator can input arbitrary Python code into this field. When calculate_grade is executed, this arbitrary code will be evaluated by the asteval interpreter, leading to a code injection vulnerability. The patch itself modifies how the result of this evaluation is used, but does not address the underlying vulnerability of user-controlled input being passed to aeval. |
django-DefectDojo/dojo/utils.py
Lines 1596 to 1608 in bb35fe8
We've notified @mtesauro.
All finding details can be found in the DryRun Security Dashboard.
|
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
|
Conflicts have been resolved. A maintainer will review the pull request shortly. |
….50.2-2.51.0-dev Release: Merge back 2.50.2 into dev from: master-into-dev/2.50.2-2.51.0-dev
Release triggered by
rossops