feat: Add dry_run support for reimport-scan operations #13563
Closed
DryRunSecurity / General Security Analyzer
succeeded
Nov 5, 2025 in 4s
DryRun Security
Details
General Security Analyzer Findings: 1 detected
⚠️ Information Disclosure in Dry Run Mode dojo/importers/default_reimporter.py (click for details)
| Type | Information Disclosure in Dry Run Mode |
| Description | The dry_run mode in the re-importer serializes detailed finding information, including title, severity, description, cwe, cve, cvssv3, component_name, component_version, file_path, and line. This serialized data is returned in the API response. The reimport_scan API endpoint, which handles this functionality, only checks for Product_Type_Member or Product_Member permissions. These permissions are broad and do not granularly restrict access to specific finding details. Therefore, a user with these permissions could potentially trigger a dry run and view sensitive vulnerability details (e.g., detailed descriptions, file paths, CVEs) for findings they might not be authorized to see through the standard UI, or for findings that are otherwise mitigated or suppressed. |
| Filename | dojo/importers/default_reimporter.py |
| CodeLink | django-DefectDojo/dojo/importers/default_reimporter.py Lines 52 to 81 in 23a9b49 |
Loading