Release: Merge release into master from: release/2.52.3#13768
Release: Merge release into master from: release/2.52.3#13768
Conversation
….53.0-dev Release: Merge back 2.52.2 into bugfix from: master-into-bugfix/2.52.2-2.53.0-dev
Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
* 🐛 fix severity order of trivy #13647 * udpate, fix unittests * update * update
We are approving a boto3 rev almost every single day at this point. Let's skip the patches and only focus on the minor revs
…origin (#13740) * feat(serializers, filters): add choice fields for business criticality, platform, lifecycle, and origin * feat(serializers): allow null values for choice fields in ProductSerializer * feat(serializers): make choice fields optional in ProductSerializer
Now that this feature has been live for a while, I think we can reduce the logging a bit. Noticed a lot of logs for this during #13241
Publish documentation on pushes to bugfix in addition to master. This will be useful for fixing urgent documentation issues without waiting for a week for the next bugfix release
Add path filter for docs in gh-pages workflow
|
This pull request fixes a stale thread-local cache for System_Settings, changes Trivy severity selection to prefer the top-level Severity field over CVSS-derived severities, and adds external third-party scripts from static.reo.dev and assets.apollo.io in the docs; together these changes introduce risks that configuration changes may not take effect until cache invalidation is addressed, may understate vulnerability risk by preferring possibly lower top-level severities over CVSS, and expose the docs to supply-chain/client-side script risks due to unpinned third‑party scripts.
Stale Cache / Configuration Bypass in
|
| Vulnerability | Stale Cache / Configuration Bypass |
|---|---|
| Description | Before this patch, System_Settings were cached in a thread-local variable without a mechanism to invalidate the cache upon database updates. This meant that if security-critical settings within System_Settings were changed (e.g., JIRA webhook secrets, password policies, API error exposure), the application could continue to operate with the old, stale settings until the application was restarted or the thread-local cache was manually cleared. This could lead to security vulnerabilities such as authentication bypasses for JIRA webhooks or weaker password policy enforcement. |
django-DefectDojo/dojo/middleware.py
Lines 115 to 118 in f1e363f
Incorrect Severity Assignment in dojo/tools/trivy/parser.py
| Vulnerability | Incorrect Severity Assignment |
|---|---|
| Description | The updated logic in dojo/tools/trivy/parser.py prioritizes the top-level Severity field from Trivy scan results over severities derived from CVSS scores. While the intent might be to use a readily available severity, this can lead to a downgrade of the actual risk. For instance, a vulnerability might have a top-level Severity of 'LOW' but a CVSSv3 score that translates to 'CRITICAL'. By taking the 'LOW' severity first, the system would misrepresent the true risk, potentially causing high-risk vulnerabilities to be overlooked or deprioritized in DefectDojo. |
django-DefectDojo/dojo/tools/trivy/parser.py
Lines 266 to 282 in f1e363f
Third-Party Script Inclusion in docs/layouts/_partials/head/script-header.html
| Vulnerability | Third-Party Script Inclusion |
|---|---|
| Description | The documentation site includes two external JavaScript files from static.reo.dev and assets.apollo.io. These scripts are likely used for marketing, analytics, or customer engagement. The dynamic nature of their URLs prevents the effective use of Subresource Integrity (SRI). If these third-party domains are compromised, an attacker could inject malicious JavaScript into the documentation site, leading to defacement, phishing, or other client-side attacks. |
django-DefectDojo/docs/layouts/_partials/head/script-header.html
Lines 1 to 12 in f1e363f
All finding details can be found in the DryRun Security Dashboard.
Release: Merge release into master from: release/2.52.3
Release triggered by
rossops