-
Notifications
You must be signed in to change notification settings - Fork 0
supply-chain-check #7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
| import yaml | ||
|
|
||
| stream = open('/home/fox/test.yaml', 'r') | ||
| data = yaml.load(stream) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: PyYAML before 5.4 is vulnerable to remote code injection. Use yaml.safe_load or Loader=SafeLoader, or upgrade to PyYAML 5.4.
Fix: Upgrade this library to at least version 5.4 at pygoat/requirements.txt:27.
Reference(s): GHSA-8q59-q68h-6hv4, CVE-2020-14343
💬 To ignore this, reply with:
• /fp <comment> for false positive
• /ar <comment> for acceptable risk
• /other <comment> for all other reasons
Alternatively, triage in Semgrep AppSec Platform to ignore the finding created by ssc-decb291c-6853-46cb-8684-af4c9788fad2.
| import yaml | ||
|
|
||
| stream = open('/home/fox/test.yaml', 'r') | ||
| data = yaml.load(stream) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: pyyaml before 5.3.1 is vulnerable to remote code injection. Use yaml.safe_load or Loader=SafeLoader, or upgrade to pyyaml 5.3.1.
Fix: Upgrade this library to at least version 5.3.1 at pygoat/requirements.txt:27.
Reference(s): GHSA-6757-jp84-gxfx, CVE-2020-1747
💬 To ignore this, reply with:
• /fp <comment> for false positive
• /ar <comment> for acceptable risk
• /other <comment> for all other reasons
Alternatively, triage in Semgrep AppSec Platform to ignore the finding created by ssc-86f1612b-2f3e-44af-ab0a-b6be01580ba9.
| import yaml | ||
|
|
||
| stream = open('/home/fox/test.yaml', 'r') | ||
| data = yaml.load(stream) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: pyyaml before 5.2 is vulnerable to OS command injection via deserialization of untrusted data. Use yaml.safe_load or Loader=SafeLoader, or upgrade to pyyaml 5.2.
Fix: Upgrade this library to at least version 5.2 at pygoat/requirements.txt:27.
Reference(s): GHSA-3pqx-4fqf-j49f, CVE-2019-20477
💬 To ignore this, reply with:
• /fp <comment> for false positive
• /ar <comment> for acceptable risk
• /other <comment> for all other reasons
Alternatively, triage in Semgrep AppSec Platform to ignore the finding created by ssc-efd016fa-8c38-4e68-abff-32484b95992a.
|




No description provided.