Release: Merge back 2.52.3 into dev from: master-into-dev/2.52.3-2.53.0-dev #13770
DryRunSecurity / General Security Analyzer
succeeded
Nov 24, 2025 in 1m 10s
DryRun Security
Details
General Security Analyzer Findings: 3 detected
⚠️ Stale System Settings Leading to Authorization/Configuration Bypass dojo/middleware.py (click for details)
| Type | Stale System Settings Leading to Authorization/Configuration Bypass |
| Description | The System_Settings model contains numerous security-sensitive configurations, including password policies, API error exposure, and integration settings. Prior to this change, modifications to these settings might not have been immediately reflected due to the DojoSytemSettingsMiddleware serving stale data from its thread-local cache. This could lead to the application operating with outdated, less secure configurations, potentially resulting in authorization bypasses, weaker authentication enforcement, or information disclosure. |
| Filename | dojo/middleware.py |
| CodeLink | django-DefectDojo/dojo/middleware.py Lines 113 to 116 in c7b813f |
⚠️ Incorrect Severity Assignment dojo/tools/trivy/parser.py (click for details)
| Type | Incorrect Severity Assignment |
| Description | The Trivy parser now prioritizes the 'Severity' field directly from the Trivy report over any severity derived from CVSS scores. This can lead to an incorrectly low severity being assigned to a vulnerability if Trivy's reported severity is lower than the severity indicated by the CVSS score. This misrepresentation can result in improper risk assessment and delayed remediation of potentially critical issues. |
| Filename | dojo/tools/trivy/parser.py |
| CodeLink | django-DefectDojo/dojo/tools/trivy/parser.py Lines 266 to 282 in c7b813f |
⚠️ Third-Party Script Inclusion / Supply Chain Risk docs/layouts/_partials/head/script-header.html (click for details)
| Type | Third-Party Script Inclusion / Supply Chain Risk |
| Description | The code introduces two dynamically loaded third-party JavaScript files from static.reo.dev and assets.apollo.io into the docs section of the application. These scripts are loaded without Subresource Integrity (SRI) hashes. This creates a supply chain risk: if either of these external domains were compromised, an attacker could inject malicious JavaScript into the application, potentially leading to Cross-Site Scripting (XSS), data exfiltration, or session hijacking for users viewing the documentation. |
| Filename | docs/layouts/_partials/head/script-header.html |
| CodeLink | django-DefectDojo/docs/layouts/_partials/head/script-header.html Lines 1 to 12 in c7b813f |
Loading