Release: Merge release into master from: release/2.53.2#13903
Release: Merge release into master from: release/2.53.2#13903
Conversation
….54.0-dev Release: Merge back 2.53.1 into bugfix from: master-into-bugfix/2.53.1-2.54.0-dev
* add asset/org info * remove ref to P/PT nestability * change screenshot * add contact email * Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> * Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> --------- Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com> Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>
* update changelog * update pro_features.md * Update docs/content/en/changelog/changelog.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> * Update docs/content/en/changelog/changelog.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> --------- Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com> Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
…13865) Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
* delete_chunk: ensure ordering * delete_chunk: wait for chunk_deletion to complete * delete_chunk: retry on deadlock * ruff --------- Co-authored-by: Valentijn Scholten <valentijn.scholten@iodigital.com>
Clarified release types and added details on dependency updates.
* dedupe: optimize found_by * fix: update expected query counts in performance tests * fix: update expected query counts in performance tests
|
This pull request introduces three security issues: an information disclosure risk where detailed JIRA error messages can be sent to any subscriber (including non-admins), a dangerous dynamic module import in a management command that could let an attacker force arbitrary Python module imports, and a command injection vulnerability in a GitHub Actions workflow that allows crafted PR titles with single quotes to execute arbitrary shell commands.
Information Disclosure through Error Messages in
|
| Vulnerability | Information Disclosure through Error Messages |
|---|---|
| Description | The system generates a detailed error message, "Object {obj.id} cannot be pushed to JIRA as the JIRA instance has been deleted or is not available." This message is then incorporated into a notification's description via the log_jira_alert and create_notification functions. The create_notification function can send these alerts to various channels, including email, Slack, and Microsoft Teams. While the jira_update event is typically for administrators, the system's notification settings allow any user to subscribe to any notification type, including jira_update. This means a non-privileged user could potentially subscribe to jira_update notifications and receive detailed internal system errors, revealing sensitive information about the JIRA integration's operational status and configuration (e.g., that a JIRA instance has been deleted or is unavailable). |
django-DefectDojo/dojo/jira_link/helper.py
Lines 906 to 909 in 7e4585d
Arbitrary Module Import in dojo/management/commands/reimport_unittest_scan.py
| Vulnerability | Arbitrary Module Import |
|---|---|
| Description | The reimport_unittest_scan management command dynamically imports a parser module based on the scan_file argument. The module_name is extracted from the first part of the scan_file path. An attacker who can execute this command could craft a scan_file path to force the application to import an arbitrary Python module, potentially leading to code execution. For example, providing scan_file='os/foo.json' would attempt to import dojo.tools.os.parser, which could then be used to access sensitive modules like os. |
django-DefectDojo/dojo/management/commands/reimport_unittest_scan.py
Lines 112 to 115 in 7e4585d
Command Injection in GitHub Actions in .github/workflows/test-helm-chart.yml
| Vulnerability | Command Injection in GitHub Actions |
|---|---|
| Description | The GitHub Actions workflow in .github/workflows/test-helm-chart.yml uses the github.event.pull_request.title directly within a shell command that executes yq. The title variable, derived from the pull request title, is used within a single-quoted string in the yq command. Although a denylist-based sanitization step is present, it does not filter out single quotes ('). An attacker can craft a pull request title containing a single quote to break out of the yq command's string literal and inject arbitrary shell commands, which will be executed on the GitHub Actions runner. |
django-DefectDojo/.github/workflows/test-helm-chart.yml
Lines 127 to 130 in 7e4585d
All finding details can be found in the DryRun Security Dashboard.
Release: Merge release into master from: release/2.53.2
Release triggered by
rossops