Skip to content

Conversation

@guyerez
Copy link
Owner

@guyerez guyerez commented Aug 20, 2025

No description provided.

@guyerez guyerez closed this Aug 20, 2025
@guyerez guyerez reopened this Aug 20, 2025
@guyerez guyerez closed this Aug 20, 2025
@guyerez guyerez reopened this Aug 20, 2025
@guyerez guyerez closed this Aug 20, 2025
@guyerez guyerez reopened this Aug 20, 2025
@guyerez guyerez closed this Aug 20, 2025
@guyerez guyerez reopened this Aug 20, 2025
@guyerez
Copy link
Owner Author

guyerez commented Aug 20, 2025

Wiz Scan Summary

Scanner Findings
Vulnerability Finding Vulnerabilities -
Data Finding Sensitive Data -
Secret Finding Secrets -
IaC Misconfiguration IaC Misconfigurations -
SAST Finding SAST Findings 4 High 11 Medium
Total 4 High 11 Medium

View scan details in Wiz

To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension.

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High SAST Finding

Unsafe Subprocess Command Execution (CWE-78)

More Details

This rule detects instances where user-controlled data is passed to the subprocess module in Python, which could lead to command injection vulnerabilities. Command injection allows an attacker to execute arbitrary system commands on the server, potentially leading to data theft, system compromise, or other malicious actions.

When user input is passed unsanitized to subprocess functions like subprocess.run(), subprocess.call(), or subprocess.Popen(), an attacker could craft input that causes the application to execute unintended system commands. This presents a significant security risk, as the attacker can potentially gain full control over the system.

To avoid this vulnerability, user input should be properly sanitized and validated before being passed to subprocess functions. Alternatively, consider using safer methods that do not involve executing external commands, or implement strict input validation and whitelisting mechanisms.

Attribute Value
Impact High
Likelihood Medium

Rule ID: WS-I013-PYTHON-00193

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High SAST Finding

Unsafe Subprocess Command Execution (CWE-78)

More Details

This rule detects instances where user-controlled data is passed to the subprocess module in Python, which could lead to command injection vulnerabilities. Command injection allows an attacker to execute arbitrary system commands on the server, potentially leading to data theft, system compromise, or other malicious actions.

When user input is passed unsanitized to subprocess functions like subprocess.run(), subprocess.call(), or subprocess.Popen(), an attacker could craft input that causes the application to execute unintended system commands. This presents a significant security risk, as the attacker can potentially gain full control over the system.

To avoid this vulnerability, user input should be properly sanitized and validated before being passed to subprocess functions. Alternatively, consider using safer methods that do not involve executing external commands, or implement strict input validation and whitelisting mechanisms.

Attribute Value
Impact High
Likelihood Medium

Rule ID: WS-I013-PYTHON-00193

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium SAST Finding

Unsafe YAML Deserialization in PyYAML (CWE-502)

More Details

Detected a possible YAML deserialization vulnerability. yaml.unsafe_load, yaml.Loader, yaml.CLoader, and yaml.UnsafeLoader are all known to be unsafe methods of deserializing YAML. An attacker with control over the YAML input could create special YAML input that allows the attacker to run arbitrary Python code. This would allow the attacker to steal files, download and install malware, or otherwise take over the machine. Use yaml.safe_load or yaml.SafeLoader instead.

Attribute Value
Impact Medium
Likelihood Medium

Rule ID: WS-I013-PYTHON-00197

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium SAST Finding

Unsafe YAML Deserialization (CWE-502)

More Details

The application is using an unsafe version of the yaml library to deserialize untrusted data, which can lead to remote code execution and other security vulnerabilities. Deserialization attacks exploit the process of reading serialized data and turning it back into an object. By constructing malicious objects and serializing them, an adversary can inject code that is executed during deserialization or exploit mass assignment by including fields that are not normally part of the serialized data.

If an application deserializes untrusted data without proper validation and sanitization, an attacker can potentially execute arbitrary code on the system, escalate privileges, or tamper with sensitive data. This vulnerability can have severe consequences, such as data breaches, system compromise, and unauthorized access to sensitive resources.

Attribute Value
Impact Medium
Likelihood Medium

Rule ID: WS-I011-PYTHON-00026

@guyerez guyerez closed this Aug 20, 2025
@guyerez guyerez reopened this Aug 20, 2025
Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High SAST Finding

Unsafe Subprocess Command Execution (CWE-78)

More Details

This rule detects instances where user-controlled data is passed to the subprocess module in Python, which could lead to command injection vulnerabilities. Command injection allows an attacker to execute arbitrary system commands on the server, potentially leading to data theft, system compromise, or other malicious actions.

When user input is passed unsanitized to subprocess functions like subprocess.run(), subprocess.call(), or subprocess.Popen(), an attacker could craft input that causes the application to execute unintended system commands. This presents a significant security risk, as the attacker can potentially gain full control over the system.

To avoid this vulnerability, user input should be properly sanitized and validated before being passed to subprocess functions. Alternatively, consider using safer methods that do not involve executing external commands, or implement strict input validation and whitelisting mechanisms.

Attribute Value
Impact High
Likelihood Medium

Rule ID: WS-I013-PYTHON-00193

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High SAST Finding

Unsafe Subprocess Command Execution (CWE-78)

More Details

This rule detects instances where user-controlled data is passed to the subprocess module in Python, which could lead to command injection vulnerabilities. Command injection allows an attacker to execute arbitrary system commands on the server, potentially leading to data theft, system compromise, or other malicious actions.

When user input is passed unsanitized to subprocess functions like subprocess.run(), subprocess.call(), or subprocess.Popen(), an attacker could craft input that causes the application to execute unintended system commands. This presents a significant security risk, as the attacker can potentially gain full control over the system.

To avoid this vulnerability, user input should be properly sanitized and validated before being passed to subprocess functions. Alternatively, consider using safer methods that do not involve executing external commands, or implement strict input validation and whitelisting mechanisms.

Attribute Value
Impact High
Likelihood Medium

Rule ID: WS-I013-PYTHON-00193

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium SAST Finding

Unsafe YAML Deserialization (CWE-502)

More Details

The application is using an unsafe version of the yaml library to deserialize untrusted data, which can lead to remote code execution and other security vulnerabilities. Deserialization attacks exploit the process of reading serialized data and turning it back into an object. By constructing malicious objects and serializing them, an adversary can inject code that is executed during deserialization or exploit mass assignment by including fields that are not normally part of the serialized data.

If an application deserializes untrusted data without proper validation and sanitization, an attacker can potentially execute arbitrary code on the system, escalate privileges, or tamper with sensitive data. This vulnerability can have severe consequences, such as data breaches, system compromise, and unauthorized access to sensitive resources.

Attribute Value
Impact Medium
Likelihood Medium

Rule ID: WS-I011-PYTHON-00026

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium SAST Finding

Unsafe YAML Deserialization in PyYAML (CWE-502)

More Details

Detected a possible YAML deserialization vulnerability. yaml.unsafe_load, yaml.Loader, yaml.CLoader, and yaml.UnsafeLoader are all known to be unsafe methods of deserializing YAML. An attacker with control over the YAML input could create special YAML input that allows the attacker to run arbitrary Python code. This would allow the attacker to steal files, download and install malware, or otherwise take over the machine. Use yaml.safe_load or yaml.SafeLoader instead.

Attribute Value
Impact Medium
Likelihood Medium

Rule ID: WS-I013-PYTHON-00197

@guyerez guyerez closed this Aug 20, 2025
@guyerez guyerez reopened this Aug 20, 2025
Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High SAST Finding

Unsafe Subprocess Command Execution (CWE-78)

More Details

This rule detects instances where user-controlled data is passed to the subprocess module in Python, which could lead to command injection vulnerabilities. Command injection allows an attacker to execute arbitrary system commands on the server, potentially leading to data theft, system compromise, or other malicious actions.

When user input is passed unsanitized to subprocess functions like subprocess.run(), subprocess.call(), or subprocess.Popen(), an attacker could craft input that causes the application to execute unintended system commands. This presents a significant security risk, as the attacker can potentially gain full control over the system.

To avoid this vulnerability, user input should be properly sanitized and validated before being passed to subprocess functions. Alternatively, consider using safer methods that do not involve executing external commands, or implement strict input validation and whitelisting mechanisms.

Attribute Value
Impact High
Likelihood Medium

Rule ID: WS-I013-PYTHON-00193

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High SAST Finding

Unsafe Subprocess Command Execution (CWE-78)

More Details

This rule detects instances where user-controlled data is passed to the subprocess module in Python, which could lead to command injection vulnerabilities. Command injection allows an attacker to execute arbitrary system commands on the server, potentially leading to data theft, system compromise, or other malicious actions.

When user input is passed unsanitized to subprocess functions like subprocess.run(), subprocess.call(), or subprocess.Popen(), an attacker could craft input that causes the application to execute unintended system commands. This presents a significant security risk, as the attacker can potentially gain full control over the system.

To avoid this vulnerability, user input should be properly sanitized and validated before being passed to subprocess functions. Alternatively, consider using safer methods that do not involve executing external commands, or implement strict input validation and whitelisting mechanisms.

Attribute Value
Impact High
Likelihood Medium

Rule ID: WS-I013-PYTHON-00193

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium SAST Finding

Unsafe YAML Deserialization (CWE-502)

More Details

The application is using an unsafe version of the yaml library to deserialize untrusted data, which can lead to remote code execution and other security vulnerabilities. Deserialization attacks exploit the process of reading serialized data and turning it back into an object. By constructing malicious objects and serializing them, an adversary can inject code that is executed during deserialization or exploit mass assignment by including fields that are not normally part of the serialized data.

If an application deserializes untrusted data without proper validation and sanitization, an attacker can potentially execute arbitrary code on the system, escalate privileges, or tamper with sensitive data. This vulnerability can have severe consequences, such as data breaches, system compromise, and unauthorized access to sensitive resources.

Attribute Value
Impact Medium
Likelihood Medium

Rule ID: WS-I011-PYTHON-00026

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium SAST Finding

Unsafe YAML Deserialization in PyYAML (CWE-502)

More Details

Detected a possible YAML deserialization vulnerability. yaml.unsafe_load, yaml.Loader, yaml.CLoader, and yaml.UnsafeLoader are all known to be unsafe methods of deserializing YAML. An attacker with control over the YAML input could create special YAML input that allows the attacker to run arbitrary Python code. This would allow the attacker to steal files, download and install malware, or otherwise take over the machine. Use yaml.safe_load or yaml.SafeLoader instead.

Attribute Value
Impact Medium
Likelihood Medium

Rule ID: WS-I013-PYTHON-00197

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants