scan 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839
  1. #!/bin/bash
  2. ignored=(
  3. # djangorestframework, installed 2.4.8, affected <3.1.1, id 25804
  4. # Description: Escape tab switching cookie name in browsable API.
  5. # Reason: We do not use the browsable API
  6. 25804
  7. # django, installed 1.6.11, affected <1.7.11, id 25714
  8. # Description: The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
  9. # Reason: We don't leverage this feature.
  10. 25714
  11. # django, installed 1.6.11, affected <1.7.6, id 25715
  12. # Description: Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property.
  13. # Reason: We don't leverage this feature.
  14. 25715
  15. # django, installed 1.6.11, affected <1.8.10, id 33073
  16. # Description: The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
  17. # Reason: We have already patched around this and use our own `is_safe_url` function pulled from Django 1.10.
  18. 33073
  19. # django, installed 1.6.11, affected <1.8.10, id 33074
  20. # Description: The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests
  21. # Reason: We don't leverage this feature, nor would a timing attack be viable due to rate limiting.
  22. 33074
  23. # django, installed 1.6.11, affected <1.8.15, id 25718
  24. # Description: The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
  25. # Reason: We have backported the patch.
  26. 25718
  27. # django, installed 1.6.11, affected >=1.5,<1.7, id 25725
  28. # Description: The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
  29. # Reason: This does not apply to us with the cookie based session backend.
  30. 25725
  31. )
  32. args="--full-report"
  33. for i in ${ignored[@]}; do
  34. args="$args --ignore=${i}"
  35. done
  36. exec safety check ${args}