Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mark use of MD5 in Azure integration as false positive #2338

Conversation

noise-kngdm
Copy link
Contributor

@noise-kngdm noise-kngdm commented Dec 14, 2021

Related issue
#2330

Description

After the investigation made in wazuh/wazuh#10116, we concluded that the use of the MD5 hashing algorithm that's being made in the Azure integration doesn't incur in a security flaw, and therefore in this PR we are marking it as a false positive for the test_python_flaws.py test.

Tests

  • Proven that tests pass when they have to pass.
  • Proven that tests fail when they have to fail.

Copy link
Member

@Rebits Rebits left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Reason specified in the conclusion of the research seems to be consistent enough to discard this positive as a code flaw.


test_python_flaws.py

R Status
R1 🟢
R2 🟢
R3 🟢
  • 🟢: All pass
  • 🟡: Some warnings
  • 🔴: Some errors/fails
  • 🔵: In progress

Copy link
Contributor

@mcarmona99 mcarmona99 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@davidjiglesias davidjiglesias merged commit 58478a5 into dev-fix-python-code-vulnerabilities Jan 5, 2022
@davidjiglesias davidjiglesias deleted the feature/2330-mark-false-positive-using-md5-wodles branch January 5, 2022 10:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants