Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verified Status Toggle: Add Granularity #11548

Merged
merged 5 commits into from
Jan 15, 2025

Update unittests/test_jira_import_and_pushing_api.py

c2b87b9
Select commit
Loading
Failed to load commit list.
Merged

Verified Status Toggle: Add Granularity #11548

Update unittests/test_jira_import_and_pushing_api.py
c2b87b9
Select commit
Loading
Failed to load commit list.
DryRunSecurity / IDOR Analyzer succeeded Jan 15, 2025 in 8s

DryRun Security

Details

IDOR Analyzer Findings: 1 detected

⚠️ Potential IDOR Vulnerability dojo/reports/views.py (click for details)
Type Potential IDOR Vulnerability
Description The code is potentially vulnerable to Insecure Direct Object Reference because it uses a user-supplied parameter pid to retrieve database records (endpoints) without explicitly scoping the query to ensure that the user has permission to access those specific endpoints. While there are some filtering conditions applied, the final endpoint_ids retrieval does not include any user-specific authorization checks, which could allow an unauthorized user to access endpoint information they should not have access to.
Filename dojo/reports/views.py
CodeLink
finding__duplicate=False,
finding__out_of_scope=False)
if get_system_setting("enforce_verified_status", True) or get_system_setting("enforce_verified_status_metrics", True):
endpoint_ids = endpoints.filter(finding__active=True).values_list("id", flat=True)
endpoint_ids = endpoints.values_list("id", flat=True)