Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade cryptography from 40.0.2 to 42.0.6 #17

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

acn-tesch
Copy link

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • services/workshop/requirements.txt
⚠️ Warning
pyOpenSSL 23.1.1 has requirement cryptography<41,>=38.0.0, but you have cryptography 42.0.6.

Vulnerabilities that will be fixed

By pinning:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
low severity 44/1000
Why? Confidentiality impact: None, Integrity impact: None, Availability impact: Low, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00044, Social Trends: No, Days since published: 26, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Low, Package Popularity Score: 99, Impact: 2.35, Likelihood: 1.84, Score Version: V5
Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-PYTHON-CRYPTOGRAPHY-6592767
cryptography:
40.0.2 -> 42.0.6
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Uncontrolled Resource Consumption ('Resource Exhaustion')

The following vulnerabilities are fixed by pinning transitive dependencies:
- https://snyk.io/vuln/SNYK-PYTHON-CRYPTOGRAPHY-6592767
@acn-tesch
Copy link
Author

Logo
Checkmarx One – Scan Summary & Details6f40b286-896b-4ef7-955b-d53718ebcac3

New Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2023-42282 Npm-ip-1.1.8 Vulnerable Package
HIGH CVE-2023-45288 Go-golang.org/x/net-v0.0.0-20200324143707-d3edc9973b7e Vulnerable Package
HIGH CVE-2023-50782 Python-cryptography-40.0.2 Vulnerable Package
HIGH CVE-2023-52428 Maven-com.nimbusds:nimbus-jose-jwt-9.25.6 Vulnerable Package
HIGH CVE-2023-6481 Maven-ch.qos.logback:logback-core-1.2.7 Vulnerable Package
HIGH CVE-2024-1597 Maven-org.postgresql:postgresql-42.4.0 Vulnerable Package
HIGH CVE-2024-22243 Maven-org.springframework:spring-web-5.3.13 Vulnerable Package
HIGH CVE-2024-22257 Maven-org.springframework.security:spring-security-core-5.6.0 Vulnerable Package
HIGH CVE-2024-22259 Maven-org.springframework:spring-web-5.3.13 Vulnerable Package
HIGH CVE-2024-22262 Maven-org.springframework:spring-web-5.3.13 Vulnerable Package
HIGH CVE-2024-23672 Maven-org.apache.tomcat.embed:tomcat-embed-websocket-9.0.55 Vulnerable Package
HIGH CVE-2024-23672 Maven-org.apache.tomcat.embed:tomcat-embed-core-9.0.55 Vulnerable Package
HIGH CVE-2024-24549 Maven-org.apache.tomcat.embed:tomcat-embed-core-9.0.55 Vulnerable Package
HIGH CVE-2024-26130 Python-cryptography-40.0.2 Vulnerable Package
HIGH CVE-2024-27088 Npm-es5-ext-0.10.62 Vulnerable Package
HIGH CVE-2024-27351 Python-Django-4.1.13 Vulnerable Package
HIGH CVE-2024-29180 Npm-webpack-dev-middleware-3.7.3 Vulnerable Package
HIGH CVE-2024-31573 Maven-org.xmlunit:xmlunit-core-2.8.3 Vulnerable Package
HIGH CVE-2024-4067 Npm-micromatch-3.1.10 Vulnerable Package
HIGH CVE-2024-4067 Npm-micromatch-4.0.2 Vulnerable Package
HIGH CVE-2024-4068 Npm-braces-3.0.2 Vulnerable Package
HIGH CVE-2024-4068 Npm-braces-2.3.2 Vulnerable Package
HIGH Cx89a94f30-7a24 Python-sqlparse-0.2.4 Vulnerable Package
HIGH JWT_No_Signature_Verification /services/web/src/utils.js: 21 Attack Vector
HIGH Process_Control /services/community/vendor/go.mongodb.org/mongo-driver/x/mongo/driver/auth/internal/gssapi/sspi_wrapper.c: 12 Attack Vector
HIGH Process_Control /services/community/vendor/github.com/globalsign/mgo/internal/sasl/sspi_windows.c: 17 Attack Vector
MEDIUM CSRF /services/workshop/crapi/mechanic/views.py: 131 Attack Vector
MEDIUM CVE-2024-21506 Python-pymongo-3.13.0 Vulnerable Package
MEDIUM CVE-2024-28849 Npm-follow-redirects-1.15.2 Vulnerable Package
MEDIUM CVE-2024-28863 Npm-tar-6.1.11 Vulnerable Package
MEDIUM CVE-2024-29041 Npm-express-4.18.2 Vulnerable Package
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/shop/tests.py: 143 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/apps.py: 65 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/shop/tests.py: 93 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/shop/tests.py: 126 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/apps.py: 72 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/shop/tests.py: 107 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/shop/tests.py: 163 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/crapi/shop/tests.py: 122 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/utils/helper.py: 5 Attack Vector
MEDIUM Filtering_Sensitive_Logs /services/workshop/utils/helper.py: 5 Attack Vector
MEDIUM Missing_HSTS_Header /services/identity/src/main/java/com/crapi/config/JwtAuthEntryPoint.java: 44 Attack Vector
MEDIUM Missing_HSTS_Header /services/workshop/crapi_site/settings.py: 1 Attack Vector
MEDIUM Privacy_Violation /services/identity/src/main/java/com/crapi/utils/SMTPMailServer.java: 56 Attack Vector
MEDIUM Privacy_Violation /services/identity/src/main/java/com/crapi/service/Impl/UserRegistrationServiceImpl.java: 60 Attack Vector
MEDIUM Privacy_Violation /services/identity/src/main/java/com/crapi/utils/SMTPMailServer.java: 56 Attack Vector
MEDIUM Privacy_Violation /services/community/api/config/Initialize_mongo.go: 27 Attack Vector
MEDIUM Privacy_Violation /services/community/api/config/Initialize_mongo.go: 27 Attack Vector
MEDIUM Privacy_Violation /services/community/api/config/Initialize_postgres.go: 36 Attack Vector
MEDIUM Privacy_Violation /services/community/vendor/github.com/jinzhu/gorm/field.go: 25 Attack Vector
MEDIUM Privacy_Violation /services/community/vendor/github.com/jinzhu/gorm/errors.go: 18 Attack Vector
MEDIUM Privacy_Violation /services/community/vendor/go.mongodb.org/mongo-driver/x/mongo/driver/auth/mongodbcr.go: 92 Attack Vector
MEDIUM Privacy_Violation /services/community/vendor/go.mongodb.org/mongo-driver/x/mongo/driver/auth/scram.go: 32 Attack Vector
MEDIUM SSL_Verification_Bypass /services/workshop/crapi/shop/views.py: 128 Attack Vector
MEDIUM SSL_Verification_Bypass /services/workshop/crapi/merchant/views.py: 77 Attack Vector
MEDIUM SSL_Verification_Bypass /services/community/api/auth/token.go: 56 Attack Vector
MEDIUM SSRF /services/workshop/crapi/user/models.py: 61 Attack Vector
MEDIUM SSRF /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
MEDIUM SSRF /services/identity/src/main/java/com/crapi/controller/ChangeEmailController.java: 43 Attack Vector
MEDIUM Unsafe_Object_Binding /services/identity/src/main/java/com/crapi/controller/AuthController.java: 147 Attack Vector
MEDIUM Unsafe_Object_Binding /services/identity/src/main/java/com/crapi/controller/ProfileController.java: 98 Attack Vector
MEDIUM Unsafe_Object_Binding /services/identity/src/main/java/com/crapi/controller/ChangeEmailController.java: 43 Attack Vector
MEDIUM Unsafe_Object_Binding /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
MEDIUM Unsafe_Object_Binding /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
MEDIUM Unsafe_Object_Binding /services/identity/src/main/java/com/crapi/controller/AuthController.java: 132 Attack Vector
MEDIUM Unsafe_Object_Binding /services/identity/src/main/java/com/crapi/controller/UserController.java: 60 Attack Vector
MEDIUM Use_of_Cryptographically_Weak_PRNG /services/gateway-service/main.go: 131 Attack Vector
MEDIUM Use_of_Cryptographically_Weak_PRNG /services/gateway-service/main.go: 84 Attack Vector
MEDIUM Use_of_Cryptographically_Weak_PRNG /services/community/vendor/go.mongodb.org/mongo-driver/x/mongo/driver/topology/topology.go: 380 Attack Vector
MEDIUM Use_of_Cryptographically_Weak_PRNG /services/community/vendor/go.mongodb.org/mongo-driver/x/mongo/driver/topology/topology.go: 336 Attack Vector
LOW Heap_Inspection /services/identity/src/main/java/com/crapi/model/SeedUser.java: 31 Attack Vector
LOW Heap_Inspection /services/identity/src/main/java/com/crapi/entity/UserPrinciple.java: 35 Attack Vector
LOW Heap_Inspection /services/identity/src/main/java/com/crapi/entity/User.java: 36 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/ProfileController.java: 62 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 95 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/service/Impl/ProfileServiceImpl.java: 210 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/ProfileController.java: 147 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/service/Impl/ProfileServiceImpl.java: 208 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/service/Impl/ProfileServiceImpl.java: 209 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/ChangeEmailController.java: 43 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 54 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/ChangeEmailController.java: 43 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 54 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/ChangeEmailController.java: 43 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/ChangeEmailController.java: 43 Attack Vector
LOW Log_Forging /services/identity/src/main/java/com/crapi/controller/AuthController.java: 77 Attack Vector
LOW Use_Of_Hardcoded_Password /services/workshop/utils/mock_methods.py: 84 Attack Vector
LOW Use_Of_Hardcoded_Password /services/workshop/utils/mock_methods.py: 54 Attack Vector
LOW Use_Of_Hardcoded_Password /services/workshop/utils/mock_methods.py: 42 Attack Vector
LOW Use_Of_Hardcoded_Password /services/workshop/crapi/apps.py: 72 Attack Vector
LOW Use_Of_Hardcoded_Password /services/workshop/crapi/apps.py: 65 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/OtpServiceImplTest.java: 240 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/UserServiceImplTest.java: 534 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/UserServiceImplTest.java: 555 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/ProfileServiceImplTest.java: 361 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/OtpServiceImplTest.java: 240 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/OtpServiceImplTest.java: 240 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/UserServiceImplTest.java: 571 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/UserServiceImplTest.java: 555 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/UserServiceImplTest.java: 563 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/UserRegistrationServiceImplTest.java: 124 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/test/java/com/crapi/service/Impl/ProfileServiceImplTest.java: 382 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/main/java/com/crapi/config/MailConfiguration.java: 47 Attack Vector
LOW Use_Of_Hardcoded_Password /services/identity/src/main/java/com/crapi/config/MailHogConfiguration.java: 45

More results are available on AST platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants