move MAX_ZIP_* to settings #14730
Merged
move MAX_ZIP_* to settings #14730
DryRunSecurity / Cross-Site Scripting Analyzer
succeeded
Apr 22, 2026 in 42s
DryRun Security
Details
Cross-Site Scripting Analyzer Findings: 1 detected
⚠️ Potential Cross-Site Scripting dojo/tools/anchore_grype/parser.py (click for details)
| Type | Potential Cross-Site Scripting |
| Description | The parser concatenates external strings (vuln_datasource, vuln_urls[], rel_datasource, rel_urls[]) directly into a finding_references string using f-strings without any escaping or sanitization. If those values originate from untrusted input (scanner output, advisories, or user-supplied data) and are later rendered into an HTML/JS context without appropriate escaping, this creates a path for XSS. |
| Filename | dojo/tools/anchore_grype/parser.py |
| CodeLink | django-DefectDojo/dojo/tools/anchore_grype/parser.py Lines 140 to 143 in 10c4133 |
Loading