Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🐛 fix trivy operator deduplication setting #10389

Merged
merged 2 commits into from
Jun 17, 2024

Conversation

manuel-sommer
Copy link
Contributor

Provide the mitigation information as soon as it becomes available. Then, the finding can be fixed.

@github-actions github-actions bot added the settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR label Jun 12, 2024
Copy link

dryrunsecurity bot commented Jun 12, 2024

Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.

DryRun Security Status Findings
Server-Side Request Forgery Analyzer 0 findings
Configured Codepaths Analyzer 0 findings
IDOR Analyzer 0 findings
Sensitive Files Analyzer 0 findings
SQL Injection Analyzer 0 findings
Authn/Authz Analyzer 0 findings
Secrets Analyzer 0 findings

Note

🟢 Risk threshold not exceeded.

Change Summary (click to expand)

The following is a summary of changes in this pull request made by me, your security buddy 🤖. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective.

Summary:

The code changes in this pull request are related to the Trivy Operator Scan and Trivy Scan parsers in the DefectDojo application. The key changes are the addition of the 'description' field to the list of fields that are parsed and stored in the DefectDojo database for both the 'Trivy Operator Scan' and 'Trivy Scan' parsers.

From an application security perspective, these changes are positive as they ensure that the 'description' field from the Trivy Operator Scan and Trivy Scan results is captured and available in the DefectDojo application. The 'description' field often contains valuable information about the vulnerability, which can help security teams better understand and prioritize the findings. Additionally, the consistent inclusion of the 'description' field across different scan types can improve the overall quality and usefulness of the data stored in the DefectDojo application, which is important for effective vulnerability management.

The other change in the pull request is an update to the SHA-256 hash file for the settings.dist.py configuration file. This change is not immediately concerning, but it's important to ensure that the new hash value is correct and that the configuration file itself does not contain any sensitive information that could introduce security vulnerabilities.

Files Changed:

  1. dojo/settings/settings.dist.py: The changes in this file are related to the Trivy Operator Scan and Trivy Scan parsers in the DefectDojo application. The 'description' field has been added to the list of fields that are parsed and stored in the DefectDojo database for both the 'Trivy Operator Scan' and 'Trivy Scan' parsers.

  2. dojo/settings/.settings.dist.py.sha256sum: This file contains the SHA-256 hash value for the settings.dist.py configuration file. The previous hash value has been updated to a new value, which should be verified to ensure that the configuration file has not been tampered with or modified in an unexpected way.

Powered by DryRun Security

@Maffooch
Copy link
Contributor

@manuel-sommer I am curious about this one.. Do you have an example for why the mitigation needs to be added to deduplication settings? This also makes me wonder if maybe there is some info in the mitigation that would be better served in the description or something

@manuel-sommer
Copy link
Contributor Author

Hi @Maffooch. So the point is that we either need the description or the mitigation field to be used in the deduplication. The reason is the following scenario.

  1. A CVE gets detected from Trivy Operator. But a fix is not yet existing. Thus, a developer does not have the information to fix the vulnerability:
    grafik
  2. A fix is now present which is recognized by the trivy operator. Then, this information should be parsed from DefectDojo and become available through deduplication as there is no mechanism right now to update an existing finding:
    grafik

@Maffooch
Copy link
Contributor

Ahh I see.. This does make more sense now. I think the description would be more appropriate than the mitigation

@manuel-sommer
Copy link
Contributor Author

Done @Maffooch. Could we merge this fast please? It would be awesome if we could get it into the next release.

Copy link
Contributor

@mtesauro mtesauro left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved

@mtesauro mtesauro merged commit 358e7f8 into DefectDojo:bugfix Jun 17, 2024
125 checks passed
mtesauro added a commit that referenced this pull request Jun 17, 2024
@manuel-sommer manuel-sommer deleted the fix_trivyoperatordedupe branch June 17, 2024 15:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
settings_changes Needs changes to settings.py based on changes in settings.dist.py included in this PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants