Release: Merge back 2.53.2 into dev from: master-into-dev/2.53.2-2.54.0-dev#13904
Release: Merge back 2.53.2 into dev from: master-into-dev/2.53.2-2.54.0-dev#13904
Conversation
….54.0-dev Release: Merge back 2.53.1 into bugfix from: master-into-bugfix/2.53.1-2.54.0-dev
* add asset/org info * remove ref to P/PT nestability * change screenshot * add contact email * Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> * Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> --------- Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com> Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>
* update changelog * update pro_features.md * Update docs/content/en/changelog/changelog.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> * Update docs/content/en/changelog/changelog.md Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com> --------- Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com> Co-authored-by: Cody Maffucci <46459665+Maffooch@users.noreply.github.com>
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
…13865) Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
* delete_chunk: ensure ordering * delete_chunk: wait for chunk_deletion to complete * delete_chunk: retry on deadlock * ruff --------- Co-authored-by: Valentijn Scholten <valentijn.scholten@iodigital.com>
Clarified release types and added details on dependency updates.
* dedupe: optimize found_by * fix: update expected query counts in performance tests * fix: update expected query counts in performance tests
Release: Merge release into master from: release/2.53.2
🔴 Risk threshold exceeded.This pull request includes sensitive edits to multiple core files (dojo/finding/*, dojo/finding_group/views.py, dojo/importers/base_importer.py, dojo/jira_link/helper.py, dojo/models.py, dojo/utils.py) and introduces two security issues: a dynamic module import in reimport_unittest_scan.py that uses unvalidated user-controlled input (risk of arbitrary code execution) and a GitHub Actions workflow that injects an unsafely-escaped pull request title into a shell command allowing command injection via crafted titles.
🔴 Configured Codepaths Edit in
|
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding/helper.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/finding_group/views.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/importers/base_importer.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/jira_link/helper.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/models.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/utils.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
Arbitrary Module Import in dojo/management/commands/reimport_unittest_scan.py
| Vulnerability | Arbitrary Module Import |
|---|---|
| Description | The reimport_unittest_scan management command dynamically imports a Python module based on user input. The module_name is extracted from the scan_file argument without validation or sanitization before being used in import_module(f"dojo.tools.{module_name}.parser"). An attacker who can execute this command and control the scan_file argument could specify a path that resolves to a malicious Python file, leading to arbitrary code execution. |
django-DefectDojo/dojo/management/commands/reimport_unittest_scan.py
Lines 112 to 115 in 7b73a29
Command Injection in GitHub Action in .github/workflows/test-helm-chart.yml
| Vulnerability | Command Injection in GitHub Action |
|---|---|
| Description | The GitHub Action workflow uses a pull request title (github.event.pull_request.title), which is user-controlled input, and embeds it into a shell command executed by yq. The sanitization logic is an incomplete blacklist that fails to escape shell metacharacters like single quotes ('). An attacker could craft a pull request title containing a single quote to break out of the string and inject arbitrary shell commands, which would be executed on the GitHub runner. |
django-DefectDojo/.github/workflows/test-helm-chart.yml
Lines 127 to 130 in 7b73a29
We've notified @mtesauro.
All finding details can be found in the DryRun Security Dashboard.
….53.2-2.54.0-dev Release: Merge back 2.53.2 into dev from: master-into-dev/2.53.2-2.54.0-dev
Release triggered by
rossops