Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configure Mend for GitHub.com #8

Open
wants to merge 58 commits into
base: stable
Choose a base branch
from

Conversation

mend-for-github-com[bot]
Copy link

Welcome to Mend for GitHub.com (formerly WhiteSource). This is an onboarding PR to help you understand and configure settings before Mend starts scanning your repository for security vulnerabilities.

🚦 Mend for GitHub.com will start scanning your repository only once you merge this Pull Request. To disable Mend for GitHub.com, simply close this Pull Request.


What to Expect

This PR contains a '.whitesource' configuration file which can be customized to your needs. If no changes were applied to this file, Mend for GitHub.com will use the default configuration.

Before merging this PR, Make sure the Issues tab is enabled. Once you merge this PR, Mend for GitHub.com will scan your repository and create a GitHub Issue for every vulnerability detected in your repository.

If you do not want a GitHub Issue to be created for each detected vulnerability, you can edit the '.whitesource' file and set the 'minSeverityLevel' parameter to 'NONE'.

If Mend Remediate Workflow Rules are set on your repository (from the Mend 'Integrate' tab), Mend will also generate a fix Pull Request for relevant vulnerabilities.


❓ Got questions? Check out Mend for GitHub.com docs.
If you need any further assistance then you can also request help here.

rielas and others added 30 commits March 12, 2024 11:07
…dant (NeuraLegion#319)

Co-authored-by: Anatol Karalkoŭ <[email protected]>
Return default chart names
Update README.md
A client side endpoint that is vulnerable to prototype pollution

---------

Co-authored-by: Tamir Gershberg <[email protected]>
pmstss and others added 28 commits June 14, 2024 17:43
- rework redundant `npm ci` calls
- CYPRESS_INSTALL_BINARY=0 to skip downloading chromium

relates-to NeuraLegion#319
Co-authored-by: Anatol Karalkoŭ <[email protected]>
Co-authored-by: denanmusinovic <[email protected]>
Co-authored-by: Denan Musinovic <[email protected]>
Co-authored-by: Viachaslau <[email protected]>
Co-authored-by: Bar Hofesh <[email protected]>
Useful for situations when the exact version of docker image needs to be provided
This PR addresses two issues in the SQL KID processor which prevent it
being exploitable in the intended fashion.

1. The code following the SQL query assumes a single result returned by
the query, while the `execute` method uses the default "all" method
which returns a list of results. This has been modified to use the "get"
method which will return a single result.
2. After the query has been executed, the key used is still always the
default key, rather than the one returned by a query. This means that
the JWT will only be validated if signed using the default key rather
than an attacker-specified key. This has been modified to always use the
key returned by the query, allowing the attacker to control the key used
to sign the token.
@msant262
Copy link

msant262 commented Jan 21, 2025

Logo
Checkmarx One – Scan Summary & Details19b12fff-bd91-4816-a4b5-b0b10b290142

New Issues (107)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2024-21536 Npm-http-proxy-middleware-0.19.1 Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-6.0.5 Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-7.0.3 Vulnerable Package
HIGH CVE-2024-29415 Npm-ip-2.0.0 Vulnerable Package
HIGH CVE-2024-29415 Npm-ip-1.1.5 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-8.12.0 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-7.5.9 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-6.2.2 Vulnerable Package
HIGH CVE-2024-37890 Npm-ws-8.12.1 Vulnerable Package
HIGH CVE-2024-42461 Npm-elliptic-6.5.4 Vulnerable Package
HIGH CVE-2024-45296 Npm-path-to-regexp-6.2.1 Vulnerable Package
HIGH CVE-2024-45296 Npm-path-to-regexp-1.8.0 Vulnerable Package
HIGH CVE-2024-45296 Npm-path-to-regexp-0.1.7 Vulnerable Package
HIGH CVE-2024-45296 Npm-path-to-regexp-3.2.0 Vulnerable Package
HIGH CVE-2024-45590 Npm-body-parser-1.19.0 Vulnerable Package
HIGH CVE-2024-48949 Npm-elliptic-6.5.4 Vulnerable Package
HIGH CVE-2024-52798 Npm-path-to-regexp-0.1.7 Vulnerable Package
HIGH Command_Injection /src/app.controller.ts: 153
detailsThe application's Lambda method calls an OS (shell) command with exec, at line 25 of /src/app.service.ts, using an untrusted string with the comman...
Attack Vector
MEDIUM CVE-2024-42459 Npm-elliptic-6.5.4 Vulnerable Package
MEDIUM CVE-2024-42460 Npm-elliptic-6.5.4 Vulnerable Package
MEDIUM CVE-2024-43788 Npm-webpack-5.28.0 Vulnerable Package
MEDIUM CVE-2024-43796 Npm-express-4.17.1 Vulnerable Package
MEDIUM CVE-2024-43799 Npm-send-0.17.2 Vulnerable Package
MEDIUM CVE-2024-43799 Npm-send-0.17.1 Vulnerable Package
MEDIUM CVE-2024-43800 Npm-serve-static-1.14.1 Vulnerable Package
MEDIUM CVE-2024-45813 Npm-find-my-way-7.5.0 Vulnerable Package
MEDIUM CVE-2024-47068 Npm-rollup-1.32.1 Vulnerable Package
MEDIUM CVE-2024-47764 Npm-cookie-0.4.0 Vulnerable Package
MEDIUM CVE-2024-47764 Npm-cookie-0.5.0 Vulnerable Package
MEDIUM CVE-2024-55565 Npm-nanoid-3.2.0 Vulnerable Package
MEDIUM Client_Potential_XSS /public/public/vendor/js/bootstrap-datetimepicker.js: 512
detailsThe method Cx37d9c29f embeds untrusted data in generated output with text, at line 512 of /public/public/vendor/js/bootstrap-datetimepicker.js. Thi...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/js/bootstrap-datetimepicker.js: 508
detailsThe method Cx37d9c29f embeds untrusted data in generated output with text, at line 508 of /public/public/vendor/js/bootstrap-datetimepicker.js. Thi...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/js/bootstrap-datetimepicker.js: 512
detailsThe method Cx37d9c29f embeds untrusted data in generated output with text, at line 512 of /public/public/js/bootstrap-datetimepicker.js. This untru...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/js/bootstrap-datetimepicker.js: 508
detailsThe method Cx37d9c29f embeds untrusted data in generated output with text, at line 508 of /public/public/js/bootstrap-datetimepicker.js. This untru...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/progressbar/progressbar.min.js: 692
detailsThe method Lambda embeds untrusted data in generated output with text, at line 692 of /public/public/vendor/progressbar/progressbar.min.js. This un...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/progressbar/progressbar.js: 2144
detailsThe method setText embeds untrusted data in generated output with text, at line 2144 of /public/public/vendor/progressbar/progressbar.js. This untr...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/progressbar/progressbar.js: 2034
detailsThe method Cx18771a06 embeds untrusted data in generated output with appendChild, at line 2051 of /public/public/vendor/progressbar/progressbar.js....
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/progressbar/progressbar.min.js: 664
detailsThe method Lambda embeds untrusted data in generated output with appendChild, at line 692 of /public/public/vendor/progressbar/progressbar.min.js. ...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/progressbar/progressbar.min.js: 664
detailsThe method a embeds untrusted data in generated output with appendChild, at line 667 of /public/public/vendor/progressbar/progressbar.min.js. This ...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/fullcalendar-3.10.0/fullcalendar.js: 7745
detailsThe method limitRow embeds untrusted data in generated output with append, at line 7712 of /public/public/vendor/fullcalendar-3.10.0/fullcalendar.j...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/fullcalendar-3.10.0/fullcalendar.js: 7745
detailsThe method Cx954ed027 embeds untrusted data in generated output with append, at line 7677 of /public/public/vendor/fullcalendar-3.10.0/fullcalendar...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/js/bootstrap-datetimepicker.js: 265
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 287 of /public/public/js/bootstrap-datetimepicker.js. This unt...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/js/bootstrap-datetimepicker.js: 265
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 287 of /public/public/vendor/js/bootstrap-datetimepicker.js. T...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/js/bootstrap-datetimepicker.js: 250
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 287 of /public/public/vendor/js/bootstrap-datetimepicker.js. T...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/js/bootstrap-datetimepicker.js: 250
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 287 of /public/public/js/bootstrap-datetimepicker.js. This unt...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 612
detailsThe method add embeds untrusted data in generated output with content, at line 1388 of /public/public/vendor/assets/vendor/owl.carousel/owl.carouse...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/assets/vendor/owl.carousel/owl.carousel.js: 612
detailsThe method add embeds untrusted data in generated output with content, at line 1388 of /public/public/assets/vendor/owl.carousel/owl.carousel.js. T...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/js/bootstrap-datetimepicker.js: 274
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 274 of /public/public/vendor/js/bootstrap-datetimepicker.js. T...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/js/bootstrap-datetimepicker.js: 274
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 274 of /public/public/js/bootstrap-datetimepicker.js. This unt...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/js/bootstrap-datetimepicker.js: 269
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 269 of /public/public/js/bootstrap-datetimepicker.js. This unt...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/js/bootstrap-datetimepicker.js: 269
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 269 of /public/public/vendor/js/bootstrap-datetimepicker.js. T...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/vendor/js/bootstrap-datetimepicker.js: 259
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 259 of /public/public/vendor/js/bootstrap-datetimepicker.js. T...
Attack Vector
MEDIUM Client_Potential_XSS /public/public/js/bootstrap-datetimepicker.js: 259
detailsThe method Cx9494c897 embeds untrusted data in generated output with append, at line 259 of /public/public/js/bootstrap-datetimepicker.js. This unt...
Attack Vector

More results are available on the CxOne platform

Fixed Issues (2004)
Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
HIGH Cx15879720-9801 Npm-knex-0.21.19
HIGH Cx89601373-08db Npm-debug-2.6.9
HIGH Cx89601373-08db Npm-debug-3.2.7
HIGH Cxf6e7f2c1-dc59 Npm-yauzl-2.10.0
LOW Client_Hardcoded_Domain /public/public/index.html: 47
LOW Client_Hardcoded_Domain /public/public/index.html: 47
LOW Client_Hardcoded_Domain /public/public/index.html: 47
LOW Client_Hardcoded_Domain /public/public/index.html: 47
LOW Client_Hardcoded_Domain /public/public/index.html: 47
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 560
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 556
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 556
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 556
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 492
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 396
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 385
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 385
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 382
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 382
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/animsition/animsition.min.js: 208
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 242
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 242
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 239
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 239
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/lightbox2/dist/js/lightbox.min.js: 169
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 90
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 90
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 90
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 90
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 90
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 90
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.min.js: 90
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/lightbox2/dist/js/lightbox.min.js: 89
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/circle-progress/circle-progress.min.js: 124
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/circle-progress/circle-progress.min.js: 74
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/js/main.js: 114
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/fullcalendar-3.10.0/fullcalendar.js: 11305
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 335
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 335
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/js/main.js: 113
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 649
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 1633
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 664
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 327
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.js: 171
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 1586
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 369
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.js: 904
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 3003
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 793
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 751
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 850
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.js: 3301
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.js: 1586
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 754
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 1441
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.js: 2734
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 642
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 545
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.js: 1424
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.js: 2659
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 658
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 811
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.js: 2702
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 270
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 658
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 808
LOW Client_JQuery_Deprecated_Symbols /public/public/js/bootstrap-datetimepicker.js: 2371
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.js: 2215
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/js/bootstrap-datetimepicker.js: 1328
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.min.js: 261
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.js: 1423
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/slick/slick.js: 2148
LOW Client_JQuery_Deprecated_Symbols /public/public/vendor/assets/vendor/owl.carousel/owl.carousel.min.js: 418
LOW Client_JQuery_Deprecated_Symbols /public/public/assets/vendor/owl.carousel/owl.carousel.js: 800

More results are available on the CxOne platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants