mirror of
https://github.com/benbusby/whoogle-search.git
synced 2026-04-25 20:25:51 +03:00
[GH-ISSUE #846] [BUG] JFrog Scan shows Vulnerabilities #532
Labels
No labels
Fixed (Pending PR Merge)
Stale
bug
enhancement
enhancement
good first issue
help wanted
keep-open
needs more info
pull-request
question
theme
unfortunate
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/whoogle-search#532
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @yodaphone on GitHub (Sep 13, 2022).
Original GitHub issue: https://github.com/benbusby/whoogle-search/issues/846
I have Docker Desktop on Windows and use the extension jfrog to scan for vulnerabilities. this is what i get when i scanned the latest version
CRITICAL - Impacted Package - Werkzeug
Summary:
Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body.
References:
github.com/pallets/werkzeug@9a3a981d70High - Impacted Package - pip
Summary:
** DISPUTED ** An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely.
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1835736
https://cowlicks.website/posts/arbitrary-code-execution-from-pips-extra-index-url.html
https://pip.pypa.io/en/stable/news/
https://lists.apache.org/thread.html/rb1adce798445facd032870d644eb39c4baaf9c4a7dd5477d12bb6ab2@%3Cgithub.arrow.apache.org%3E
@benbusby commented on GitHub (Jan 4, 2023):
Thanks for the report, and apologies for the delayed response. As noted in the issue summary, this only impacts the
extra-index-urloption for pip, and doesn't apply to Whoogle itself.