[GH-ISSUE #846] [BUG] JFrog Scan shows Vulnerabilities #532

Closed
opened 2026-02-25 20:35:58 +03:00 by kerem · 1 comment
Owner

Originally created by @yodaphone on GitHub (Sep 13, 2022).
Original GitHub issue: https://github.com/benbusby/whoogle-search/issues/846

I have Docker Desktop on Windows and use the extension jfrog to scan for vulnerabilities. this is what i get when i scanned the latest version

CRITICAL - Impacted Package - Werkzeug

Summary:
Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body.

References:
github.com/pallets/werkzeug@9a3a981d70

High - Impacted Package - pip
Summary:

** DISPUTED ** An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1835736
https://cowlicks.website/posts/arbitrary-code-execution-from-pips-extra-index-url.html
https://pip.pypa.io/en/stable/news/
https://lists.apache.org/thread.html/rb1adce798445facd032870d644eb39c4baaf9c4a7dd5477d12bb6ab2@%3Cgithub.arrow.apache.org%3E

Originally created by @yodaphone on GitHub (Sep 13, 2022). Original GitHub issue: https://github.com/benbusby/whoogle-search/issues/846 I have Docker Desktop on Windows and use the extension jfrog to scan for vulnerabilities. this is what i get when i scanned the latest version CRITICAL - Impacted Package - Werkzeug Summary: Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. References: https://github.com/pallets/werkzeug/commit/9a3a981d70d2e9ec3344b5192f86fcaf3210cd85 High - Impacted Package - pip Summary: ** DISPUTED ** An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely. References: https://bugzilla.redhat.com/show_bug.cgi?id=1835736 https://cowlicks.website/posts/arbitrary-code-execution-from-pips-extra-index-url.html https://pip.pypa.io/en/stable/news/ https://lists.apache.org/thread.html/rb1adce798445facd032870d644eb39c4baaf9c4a7dd5477d12bb6ab2@%3Cgithub.arrow.apache.org%3E
kerem 2026-02-25 20:35:58 +03:00
  • closed this issue
  • added the
    bug
    label
Author
Owner

@benbusby commented on GitHub (Jan 4, 2023):

Thanks for the report, and apologies for the delayed response. As noted in the issue summary, this only impacts the extra-index-url option for pip, and doesn't apply to Whoogle itself.

<!-- gh-comment-id:1371231735 --> @benbusby commented on GitHub (Jan 4, 2023): Thanks for the report, and apologies for the delayed response. As noted in the issue summary, this only impacts the `extra-index-url` option for pip, and doesn't apply to Whoogle itself.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/whoogle-search#532
No description provided.