Skip to content

Conversation

@github-actions
Copy link
Contributor

Release triggered by rossops

valentijnscholten and others added 30 commits October 6, 2025 12:21
….52.0-dev

Release: Merge back 2.51.0 into bugfix from: master-into-bugfix/2.51.0-2.52.0-dev
Bumps [django](https://github.com/django/django) from 5.1.12 to 5.1.13.
- [Commits](django/django@5.1.12...5.1.13)

---
updated-dependencies:
- dependency-name: django
  dependency-version: 5.1.13
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* watson middleware: skip logging if no instances updated

* watson middleware: skip logging if no instances updated
valentijnscholten and others added 8 commits October 12, 2025 19:29
feat(helm): Add support for automountServiceAccountToken
…ttests

add unit tests to test importer deduplication
fix: handle broken endpoints when <StartURL> includes a port number in Acunetix XML parser
…mprovements

pghistory improvements: backfill and "empty" changes
Release: Merge release into master from: release/2.51.1
@dryrunsecurity
Copy link

dryrunsecurity bot commented Oct 14, 2025

DryRun Security

🔴 Risk threshold exceeded.

This pull request includes a sensitive edit to dojo/user/views.py that matches configured-sensitive file patterns, and introduces a command-injection vulnerability in .github/workflows/release-x-manual-helm-chart.yml where the user-controlled workflow_dispatch input release_number is interpolated into a shell run step (git commit -m), allowing arbitrary command execution on the Actions runner.

🔴 Configured Codepaths Edit in dojo/user/views.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.
Command Injection in .github/workflows/release-x-manual-helm-chart.yml
Vulnerability Command Injection
Description The GitHub Actions workflow release-x-manual-helm-chart.yml is vulnerable to command injection. The inputs.release_number value, which is user-controlled via workflow_dispatch, is directly interpolated into a git commit -m command within a run step. This allows an attacker to inject shell metacharacters and execute arbitrary commands on the GitHub Actions runner.

git commit -m "Update index.yaml - ${{ inputs.release_number }}"
git push -u origin helm-charts

We've notified @mtesauro.


All finding details can be found in the DryRun Security Dashboard.

@github-actions
Copy link
Contributor Author

This pull request has conflicts, please resolve those before we can evaluate the pull request.

@github-actions
Copy link
Contributor Author

Conflicts have been resolved. A maintainer will review the pull request shortly.

@github-actions
Copy link
Contributor Author

Conflicts have been resolved. A maintainer will review the pull request shortly.

@rossops rossops merged commit 4d2fe44 into dev Oct 14, 2025
148 of 150 checks passed
@rossops rossops deleted the master-into-dev/2.51.1-2.52.0-dev branch October 14, 2025 18:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants