Skip to content

Conversation

@brendan-wiz
Copy link

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)

Snyk has created this PR to fix 7 vulnerabilities in the pip dependencies of this project.

Snyk changed the following file(s):

  • Packs/Exchange2016_Compliance/Integrations/Exchange2016_Compliance/doc_files/requirements.txt
⚠️ Warning ``` requests 2.20.0 has requirement urllib3<1.25,>=1.21.1, but you have urllib3 1.25.9.
</details>





---

> [!IMPORTANT]
>
> - Check the changes in this PR to ensure they won't cause issues with your project.
> - Max score is 1000. Note that the real score may have changed since the PR was raised.
> - This PR was automatically created by Snyk using the credentials of a real user.
> - Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

---

**Note:** _You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs._

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiIwZmU3YWE2ZS00OGQ0LTQ5YjYtYTkxMy02MDIzMGViMjZlZjciLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjBmZTdhYTZlLTQ4ZDQtNDliNi1hOTEzLTYwMjMwZWIyNmVmNyJ9fQ==" width="0" height="0"/>
🧐 [View latest project report](https://app.snyk.io/org/gem-security/project/fef22732-035f-427d-9dea-7e8584a08deb?utm_source&#x3D;github&amp;utm_medium&#x3D;referral&amp;page&#x3D;fix-pr)
📜 [Customise PR templates](https://docs.snyk.io/scan-using-snyk/pull-requests/snyk-fix-pull-or-merge-requests/customize-pr-templates)
🛠 [Adjust project settings](https://app.snyk.io/org/gem-security/project/fef22732-035f-427d-9dea-7e8584a08deb?utm_source&#x3D;github&amp;utm_medium&#x3D;referral&amp;page&#x3D;fix-pr/settings)
📚 [Read about Snyk's upgrade logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities)

---

**Learn how to fix vulnerabilities with free interactive lessons:**

🦉 [Arbitrary Code Execution](https://learn.snyk.io/lesson/malicious-code-injection/?loc&#x3D;fix-pr)

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"certifi","from":"2017.11.5","to":"2023.7.22"},{"name":"pyyaml","from":"3.12","to":"4.2b1"},{"name":"requests","from":"2.18.4","to":"2.20"},{"name":"urllib3","from":"1.22","to":"1.25.9"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-CERTIFI-5805047","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Following of a Certificate's Chain of Trust"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-CERTIFI-5805047","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Following of a Certificate's Chain of Trust"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-PYYAML-42159","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"Proof of Concept","id":"SNYK-PYTHON-REQUESTS-72435","priority_score":811,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Information Exposure"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-URLLIB3-1014645","priority_score":599,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"HTTP Header Injection"},{"exploit_maturity":"Mature","id":"SNYK-PYTHON-URLLIB3-174323","priority_score":794,"priority_score_factors":[{"type":"exploit","label":"High","score":214},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"CRLF injection"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-URLLIB3-174464","priority_score":589,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Certificate Validation"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-URLLIB3-5969479","priority_score":584,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.4","score":370},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure Through Sent Data"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-URLLIB3-1014645","priority_score":599,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"HTTP Header Injection"},{"exploit_maturity":"Mature","id":"SNYK-PYTHON-URLLIB3-174323","priority_score":794,"priority_score_factors":[{"type":"exploit","label":"High","score":214},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"CRLF injection"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-URLLIB3-174464","priority_score":589,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Certificate Validation"},{"exploit_maturity":"No Known Exploit","id":"SNYK-PYTHON-URLLIB3-5969479","priority_score":584,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.4","score":370},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Information Exposure Through Sent Data"}],"prId":"0fe7aa6e-48d4-49b6-a913-60230eb26ef7","prPublicId":"0fe7aa6e-48d4-49b6-a913-60230eb26ef7","packageManager":"pip","priorityScoreList":[704,704,811,599,794,589,584],"projectPublicId":"fef22732-035f-427d-9dea-7e8584a08deb","projectUrl":"https://app.snyk.io/org/gem-security/project/fef22732-035f-427d-9dea-7e8584a08deb?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["pr-warning-shown","priorityScore"],"type":"user-initiated","upgrade":[],"vulns":["SNYK-PYTHON-CERTIFI-5805047","SNYK-PYTHON-PYYAML-42159","SNYK-PYTHON-REQUESTS-72435","SNYK-PYTHON-URLLIB3-1014645","SNYK-PYTHON-URLLIB3-174323","SNYK-PYTHON-URLLIB3-174464","SNYK-PYTHON-URLLIB3-5969479"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'

@wiz-inc-98909e62bd
Copy link

wiz-inc-98909e62bd bot commented Jun 5, 2024

Wiz Scan Summary

IaC Misconfigurations 0C 0H 0M 0L 0I
Vulnerabilities 2C 1H 4M 0L 0I
Sensitive Data 0C 0H 0M 0L 0I
Total 2C 1H 4M 0L 0I
Secrets 0🔑

pyyaml==3.12
requests==2.18.4
urllib3==1.22
pyyaml==4.2b1

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The following vulnerabilities impact pyyaml versions <5.4.0: CVE-2020-14343, CVE-2020-1747.

These can be remediated by updating to version 5.4.0 or higher.

Suggested change
pyyaml==4.2b1
pyyaml==5.4.0

requests==2.18.4
urllib3==1.22
pyyaml==4.2b1
requests==2.20

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The following vulnerabilities impact requests versions <2.32.0: CVE-2023-32681, CVE-2024-35195.

These can be remediated by updating to version 2.32.0 or higher.

Suggested change
requests==2.20
requests==2.32.0

urllib3==1.22
pyyaml==4.2b1
requests==2.20
urllib3==1.25.9

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The following vulnerabilities impact urllib3 versions <1.26.18: CVE-2021-33503, CVE-2023-43804, CVE-2023-45803.

These can be remediated by updating to version 1.26.18 or higher.

Suggested change
urllib3==1.25.9
urllib3==1.26.18

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants