Skip to content

Release: Merge release into master from: release/2.53.2#13903

Merged
rossops merged 21 commits intomasterfrom
release/2.53.2
Dec 15, 2025
Merged

Release: Merge release into master from: release/2.53.2#13903
rossops merged 21 commits intomasterfrom
release/2.53.2

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

Release triggered by rossops

DefectDojo release bot and others added 20 commits December 8, 2025 17:28
….54.0-dev

Release: Merge back 2.53.1 into bugfix from: master-into-bugfix/2.53.1-2.54.0-dev
* add asset/org info

* remove ref to P/PT nestability

* change screenshot

* add contact email

* Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md

Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>

* Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md

Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>

---------

Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>
* update changelog

* update pro_features.md

* Update docs/content/en/changelog/changelog.md

Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>

* Update docs/content/en/changelog/changelog.md

Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>

---------

Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
…13865)

Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
* delete_chunk: ensure ordering

* delete_chunk: wait for chunk_deletion to complete

* delete_chunk: retry on deadlock

* ruff

---------

Co-authored-by: Valentijn Scholten <valentijn.scholten@iodigital.com>
Clarified release types and added details on dependency updates.
* dedupe: optimize found_by

* fix: update expected query counts in performance tests

* fix: update expected query counts in performance tests
@rossops rossops closed this Dec 15, 2025
@rossops rossops reopened this Dec 15, 2025
@github-actions github-actions Bot added settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR docs unittests helm labels Dec 15, 2025
@dryrunsecurity
Copy link
Copy Markdown

dryrunsecurity Bot commented Dec 15, 2025

DryRun Security

This pull request introduces three security issues: an information disclosure risk where detailed JIRA error messages can be sent to any subscriber (including non-admins), a dangerous dynamic module import in a management command that could let an attacker force arbitrary Python module imports, and a command injection vulnerability in a GitHub Actions workflow that allows crafted PR titles with single quotes to execute arbitrary shell commands.

Information Disclosure through Error Messages in dojo/jira_link/helper.py
Vulnerability Information Disclosure through Error Messages
Description The system generates a detailed error message, "Object {obj.id} cannot be pushed to JIRA as the JIRA instance has been deleted or is not available." This message is then incorporated into a notification's description via the log_jira_alert and create_notification functions. The create_notification function can send these alerts to various channels, including email, Slack, and Microsoft Teams. While the jira_update event is typically for administrators, the system's notification settings allow any user to subscribe to any notification type, including jira_update. This means a non-privileged user could potentially subscribe to jira_update notifications and receive detailed internal system errors, revealing sensitive information about the JIRA integration's operational status and configuration (e.g., that a JIRA instance has been deleted or is unavailable).

message = f"Object {obj.id} cannot be pushed to JIRA as the JIRA instance has been deleted or is not available."
return failure_to_add_message(message, None, obj)
obj_can_be_pushed_to_jira, error_message, _error_code = can_be_pushed_to_jira(obj)

Arbitrary Module Import in dojo/management/commands/reimport_unittest_scan.py
Vulnerability Arbitrary Module Import
Description The reimport_unittest_scan management command dynamically imports a parser module based on the scan_file argument. The module_name is extracted from the first part of the scan_file path. An attacker who can execute this command could craft a scan_file path to force the application to import an arbitrary Python module, potentially leading to code execution. For example, providing scan_file='os/foo.json' would attempt to import dojo.tools.os.parser, which could then be used to access sensitive modules like os.

module = import_module(f"dojo.tools.{module_name}.parser")
# Find the parser class
parser_class = None

Command Injection in GitHub Actions in .github/workflows/test-helm-chart.yml
Vulnerability Command Injection in GitHub Actions
Description The GitHub Actions workflow in .github/workflows/test-helm-chart.yml uses the github.event.pull_request.title directly within a shell command that executes yq. The title variable, derived from the pull request title, is used within a single-quoted string in the yq command. Although a denylist-based sanitization step is present, it does not filter out single quotes ('). An attacker can craft a pull request title containing a single quote to break out of the yq command's string literal and inject arbitrary shell commands, which will be executed on the GitHub Actions runner.

yq -i '.annotations."artifacthub.io/changes" += "- kind: changed\n description: '$title'\n"' helm/defectdojo/Chart.yaml
git add helm/defectdojo/Chart.yaml
git commit -m "ci: update Chart annotations from PR #${{ github.event.pull_request.number }}" || echo "No changes to commit"


All finding details can be found in the DryRun Security Dashboard.

@rossops rossops merged commit f21b1ff into master Dec 15, 2025
30 checks passed
Maffooch pushed a commit to valentijnscholten/django-DefectDojo that referenced this pull request Feb 16, 2026
Release: Merge release into master from: release/2.53.2
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

docs helm settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR unittests

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants