Demo#229
Conversation
| @@ -1,9 +1,15 @@ | |||
| FROM ubuntu:latest | |||
| COPY wild.py / | |||
| # Pull the minimal Ubuntu image | |||
There was a problem hiding this comment.
A user for the container has not been created
Resource: /Dockerfile. | Checkov ID: CKV_DOCKER_3
Description
The policy's primary purpose is to verify that a dedicated user has been explicitly created for running the container. This is essential to avoid running the container with root privileges, which could introduce significant security risks in case of a compromise. Running containers as a non-root user reduces the potential impact of a security breach.
| FROM ubuntu:latest | ||
| COPY wild.py / | ||
| # Pull the minimal Ubuntu image | ||
| FROM us-central1-docker.pkg.dev/panw-utd-public-cloud/utd-demo-images/utd-cnsp/ubuntu:malware |
There was a problem hiding this comment.
Healthcheck instructions have not been added to container images
Resource: /Dockerfile. | Checkov ID: CKV_DOCKER_2
Description
We recommend that you add the HEALTHCHECK instruction to your Docker container images to ensure that health checks are executed against running containers.
An important security control is that of availability.
Adding the HEALTHCHECK instruction to your container image ensures that the Docker engine periodically checks the running container instances against that instruction to ensure that containers are still operational.
Based on the results of the health check, the Docker engine could terminate containers which are not responding correctly, and instantiate new ones.
| @@ -1,9 +1,15 @@ | |||
| FROM ubuntu:latest | |||
| COPY wild.py / | |||
| # Pull the minimal Ubuntu image | |||
There was a problem hiding this comment.
nghttp2 1.30.0-1ubuntu1 / Dockerfile.FROM
Total vulnerabilities: 1
| Critical: 0 | High: 1 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2023-44487 | 7.5 | - |
Open |
| six==1.10.0 | ||
| SQLAlchemy==1.1.11 | ||
| tornado==4.5.1 | ||
| urllib3==1.21.1 |
There was a problem hiding this comment.
urllib3 1.21.1 / requirements.txt
Total vulnerabilities: 3
| Critical: 1 | High: 2 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2018-20060 | 9.8 | 1.23 |
Open | |
| CVE-2019-11324 | 7.5 | 1.24.2 |
Open | |
| CVE-2023-43804 | 8.1 | 1.26.17 |
Open |
| idna==2.5 | ||
| ipaddress==1.0.18 | ||
| itsdangerous==0.24 | ||
| Jinja2==2.9.6 |
There was a problem hiding this comment.
jinja2 2.9.6 / requirements.txt
Total vulnerabilities: 1
| Critical: 0 | High: 1 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2019-10906 | 8.6 | 2.10.1 |
Open |
| MySQL-python==1.2.5 | ||
| PyJWT==1.5.2 | ||
| python-dateutil==2.6.0 | ||
| python-docx==0.8.5 |
There was a problem hiding this comment.
python-docx 0.8.5 / requirements.txt
Total vulnerabilities: 1
| Critical: 0 | High: 1 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2016-5851 | 8.8 | 0.8.6 |
Open |
| lxml==4.2.1 | ||
| MarkupSafe==1.0 | ||
| MySQL-python==1.2.5 | ||
| PyJWT==1.5.2 |
There was a problem hiding this comment.
pyjwt 1.5.2 / requirements.txt
Total vulnerabilities: 1
| Critical: 0 | High: 1 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2022-29217 | 7.5 | 2.4.0 |
Open |
| ipaddress==1.0.18 | ||
| itsdangerous==0.24 | ||
| Jinja2==2.9.6 | ||
| lxml==4.2.1 |
There was a problem hiding this comment.
lxml 4.2.1 / requirements.txt
Total vulnerabilities: 2
| Critical: 0 | High: 2 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2021-43818 | 7.1 | 4.6.5 |
Open | |
| CVE-2022-2309 | 7.5 | 4.9.1 |
Open |
| python-dateutil==2.6.0 | ||
| python-docx==0.8.5 | ||
| PyYAML==3.12 | ||
| requests==2.18.1 |
There was a problem hiding this comment.
requests 2.18.1 / requirements.txt
Total vulnerabilities: 1
| Critical: 0 | High: 1 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2018-18074 | 7.5 | 2.20.0 |
Open |
| Faker==0.7.17 | ||
| Flask==0.12.2 | ||
| Flask-SQLAlchemy==2.2 | ||
| gevent==1.2.2 |
There was a problem hiding this comment.
gevent 1.2.2 / requirements.txt
Total vulnerabilities: 1
| Critical: 1 | High: 0 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2023-41419 | 9.8 | 23.9.0 |
Open |
| chardet==3.0.4 | ||
| click==6.7 | ||
| Faker==0.7.17 | ||
| Flask==0.12.2 |
There was a problem hiding this comment.
flask 0.12.2 / requirements.txt
Total vulnerabilities: 3
| Critical: 0 | High: 3 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2019-1010083 | 7.5 | 1.0 |
Open | |
| CVE-2018-1000656 | 7.5 | 0.12.3 |
Open | |
| CVE-2023-30861 | 7.5 | 2.2.5 |
Open |
| PyJWT==1.5.2 | ||
| python-dateutil==2.6.0 | ||
| python-docx==0.8.5 | ||
| PyYAML==3.12 |
There was a problem hiding this comment.
pyyaml 3.12 / requirements.txt
Total vulnerabilities: 1
| Critical: 1 | High: 0 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2017-18342 | 9.8 | 5.1 |
Open |
| SQLAlchemy==1.1.11 | ||
| tornado==4.5.1 | ||
| urllib3==1.21.1 | ||
| Werkzeug==0.14.1 |
There was a problem hiding this comment.
werkzeug 0.14.1 / requirements.txt
Total vulnerabilities: 7
| Critical: 0 | High: 7 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| PRISMA-2023-0035 | 7.5 | 2.3.0 |
Open | |
| CVE-2024-34069 | 7.5 | 3.0.3 |
Open | |
| CVE-2019-14806 | 7.5 | 0.15.3 |
Open | |
| CVE-2023-25577 | 7.5 | 2.2.3 |
Open | |
| CVE-2023-46136 | 7.5 | 2.3.8 |
Open | |
| CVE-2024-49767 | 7.5 | 3.0.6 |
Open | |
| CVE-2019-14322 | 7.5 | 0.15.5 |
Open |
| Werkzeug==0.14.1 No newline at end of file | ||
|
|
||
| backports-abc==0.5 | ||
| certifi==2017.4.17 |
There was a problem hiding this comment.
certifi 2017.4.17 / requirements.txt
Total vulnerabilities: 1
| Critical: 1 | High: 0 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2023-37920 | 9.8 | 2023.07.22 |
Open |
| requests==2.18.1 | ||
| singledispatch==3.4.0.3 | ||
| six==1.10.0 | ||
| SQLAlchemy==1.1.11 |
There was a problem hiding this comment.
sqlalchemy 1.1.11 / requirements.txt
Total vulnerabilities: 1
| Critical: 1 | High: 0 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2019-7164 | 9.8 | 1.2.18 |
Open |
| singledispatch==3.4.0.3 | ||
| six==1.10.0 | ||
| SQLAlchemy==1.1.11 | ||
| tornado==4.5.1 |
There was a problem hiding this comment.
tornado 4.5.1 / requirements.txt
Total vulnerabilities: 1
| Critical: 0 | High: 1 | Medium: 0 | Low: 0 |
|---|
| Vulnerability ID | Severity | CVSS | Fixed in | Status |
|---|---|---|---|---|
| CVE-2024-52804 | 7.5 | 6.4.2 |
Open |
Bumps [virtualenv](https://github.com/pypa/virtualenv) from 20.4.3 to 20.29.3. - [Release notes](https://github.com/pypa/virtualenv/releases) - [Changelog](https://github.com/pypa/virtualenv/blob/main/docs/changelog.rst) - [Commits](pypa/virtualenv@20.4.3...20.29.3) --- updated-dependencies: - dependency-name: virtualenv dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
Bump virtualenv from 20.4.3 to 20.29.3
No description provided.