Skip to content

Conversation

@testaccount90009
Copy link
Contributor

@testaccount90009 testaccount90009 commented Dec 11, 2025

Same as this PR, just in the product area instead of findings. The formatting drives me mad lol

#13835

Edit to update -- also found in Engagements All -> Closed (bottom of page) - bad formatting.

DefectDojo release bot and others added 6 commits December 8, 2025 17:28
…x/2.53.1-2.54.0-dev

Release: Merge back 2.53.1 into bugfix from: master-into-bugfix/2.53.1-2.54.0-dev
* add asset/org info

* remove ref to P/PT nestability

* change screenshot

* add contact email

* Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md

Co-authored-by: Cody Maffucci <[email protected]>

* Update docs/content/en/working_with_findings/organizing_engagements_tests/pro_assets_organizations.md

Co-authored-by: Cody Maffucci <[email protected]>

---------

Co-authored-by: Paul Osinski <[email protected]>
Co-authored-by: Cody Maffucci <[email protected]>
* update changelog

* update pro_features.md

* Update docs/content/en/changelog/changelog.md

Co-authored-by: Cody Maffucci <[email protected]>

* Update docs/content/en/changelog/changelog.md

Co-authored-by: Cody Maffucci <[email protected]>

---------

Co-authored-by: Paul Osinski <[email protected]>
Co-authored-by: Cody Maffucci <[email protected]>
@github-actions github-actions bot added docker settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR docs unittests ui parser helm labels Dec 11, 2025
@dryrunsecurity
Copy link

dryrunsecurity bot commented Dec 11, 2025

DryRun Security

🔴 Risk threshold exceeded.

This pull request makes sensitive edits to multiple core files (dojo/importers/base_importer.py, dojo/filters.py, dojo/finding/views.py, and dojo/utils.py) and introduces an information disclosure issue where get_visible_scan_types() exposes all active scan types to any authenticated user with product/engagement access; it also uses unvalidated workflow input release_number as the ref in .github/workflows/release-x-manual-docker-containers.yml, allowing a repo write attacker to run arbitrary code with workflow secrets.

🔴 Configured Codepaths Edit in dojo/importers/base_importer.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
🔴 Configured Codepaths Edit in dojo/filters.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
🔴 Configured Codepaths Edit in dojo/finding/views.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
🔴 Configured Codepaths Edit in dojo/utils.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
🔴 Configured Codepaths Edit in dojo/utils.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
Untrusted Input in GitHub Actions Workflow in .github/workflows/release-x-manual-docker-containers.yml
Vulnerability Untrusted Input in GitHub Actions Workflow
Description The GitHub Actions workflow '.github/workflows/release-x-manual-docker-containers.yml' uses the release_number input directly as the ref for the actions/checkout step without any validation. An attacker with write access to the repository can trigger this workflow_dispatch event and provide an arbitrary Git reference (e.g., a malicious branch, tag, or commit hash) to the release_number input. This allows the attacker to execute arbitrary code in the context of the workflow runner, which has access to sensitive secrets like DOCKERHUB_TOKEN and DOCKERHUB_USERNAME.

ref: ${{ inputs.release_number }}

Information Disclosure of Scan Types in dojo/finding/views.py
Vulnerability Information Disclosure of Scan Types
Description The get_visible_scan_types() function, used in the ListFindings view, retrieves all active Test_Type objects without performing any authorization checks. While the ListFindings view itself has authorization checks (Permissions.Product_View or Permissions.Engagement_View), the get_visible_scan_types() function does not filter the scan types based on the user's permissions. This means any authenticated user with access to a product or engagement can view a list of all active scan types configured in the system, regardless of whether they have specific permissions to create or manage those scan types. This could reveal internal security tooling and capabilities to unauthorized users.

"visible_test_types": get_visible_scan_types(),
}
# Look to see if the product was used
if product_id := self.get_product_id():

We've notified @mtesauro.


All finding details can be found in the DryRun Security Dashboard.

@testaccount90009
Copy link
Contributor Author

Should I rebase against bugfix, or is dev -> bugfix the correct approach? Sorry, it's been a while since I've contributed.

add autoWidth: false to engagements also
@testaccount90009
Copy link
Contributor Author

Update - I found this problem in the engagements_all.html file as well at the bottom under 'Closed Engagements' it has bad formatting.

@valentijnscholten
Copy link
Member

Thanks. Looks like the PR needs a rebase or cherrypick of your sommit onto the bugfix branch.

@testaccount90009
Copy link
Contributor Author

Thanks. Looks like the PR needs a rebase or cherrypick of your sommit onto the bugfix branch.

Will do - not sure what happened.

@testaccount90009
Copy link
Contributor Author

If it's easier to just cherry pick these commits in a different PR and close this PR, that's fine. Think I have some Git issues going on, if that merge didn't fix it. Been a while since I've used that system - so it may need some cleaning up locally.

@testaccount90009 testaccount90009 changed the base branch from bugfix to dev December 12, 2025 19:16
@testaccount90009
Copy link
Contributor Author

Found the issue, I'll open a fresh PR and get rid of this noise - apologies.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

docker docs helm parser settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR ui unittests

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants