Release: Merge back 2.49.1 into dev from: master-into-dev/2.49.1-2.50.0-dev#12964
Merged
Release: Merge back 2.49.1 into dev from: master-into-dev/2.49.1-2.50.0-dev#12964
Conversation
….50.0-dev Release: Merge back 2.49.0 into bugfix from: master-into-bugfix/2.49.0-2.50.0-dev
This reverts commit e9d9872.
* Webhook Notifications: Support the owner field * Forgot the `engagement_added` event in docs * Support the case where the owner is not supplied * Adding tests * Adding a new user to the test data had surprising consequences...
* Docs: Restore `package-lock.json` * Update SEO params
* snyk_issue_api: support code items * make fix_available backward compatible
* Revert "Feat(nginx): Add support for IPv6" This reverts commit e9d9872. * Feat(nginx): Add support for IPv6 * proper handling non-IPv6 hosts
Alternative command useful for automation.
* Documentation: Guide to testing hugo pipeline locally * Forgot I was on an a newer version of hugo
Release: Merge release into master from: release/2.49.1
🔴 Risk threshold exceeded.This pull request contains sensitive edits to multiple files including Python and shell script files, and also includes potential security risks such as a hardcoded weak password in Docker documentation and information disclosure in webhook payloads that expose user personal information.
🔴 Configured Codepaths Edit in
|
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in docker/entrypoint-nginx.sh
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/templatetags/display_tags.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/templatetags/navigation_tags.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
Hardcoded Weak Password in Documentation in readme-docs/DOCKER.md
| Vulnerability | Hardcoded Weak Password in Documentation |
|---|---|
| Description | The documentation for Docker Compose includes an example command to change the admin password that contains a hardcoded, weak password ('Password123!'). There is no prominent warning or instruction advising users to change this password to a strong, unique one, or to use a placeholder. This could lead to users deploying instances with a known, easily guessable admin password, making them vulnerable to unauthorized access. |
django-DefectDojo/readme-docs/DOCKER.md
Lines 152 to 162 in e335e63
Information Disclosure in Webhook Payload in dojo/templates/notifications/webhooks/subtemplates/user.tpl
| Vulnerability | Information Disclosure in Webhook Payload |
|---|---|
| Description | The user.tpl template, which is included in various webhook notification payloads, explicitly exposes sensitive user information. This includes the user's ID, email address, username, first name, last name, and UI/API URLs. This data is transmitted in webhook events, creating a risk of information disclosure if the webhook endpoint is untrusted or the communication is intercepted. There is no apparent mechanism within the application's configuration to control or redact this PII from the webhook payloads. |
We've notified @mtesauro.
All finding details can be found in the DryRun Security Dashboard.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Release triggered by
rossops