Release: Merge release into master from: release/2.33.6 #10039
DryRun Security
Details
Authn/Authz Analyzer Findings: 10 detected
⚠️ Potential Authn/Authz Function Used or Modified dojo/filters.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains functions related to authentication or authorization, specifically the reporter and reviewers fields. These fields are typically used for access control and authorization purposes, where the application needs to identify the user who reported the finding and the users who are authorized to review it. |
Filename | dojo/filters.py |
CodeLink | django-DefectDojo/dojo/filters.py Lines 315 to 342 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/filters.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains several functions that appear to be related to authentication and authorization, such as get_authorized_users and get_authorized_risk_acceptances . These functions are used to filter the queryset of user and risk acceptance models based on user permissions, which is a common pattern for implementing access control in web applications. |
Filename | dojo/filters.py |
CodeLink | django-DefectDojo/dojo/filters.py Lines 1751 to 1799 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/filters.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains functions related to authentication and authorization. The FindingFilter class has fields such as reporter and reviewers which indicate that the application is managing user roles and permissions. Additionally, the set_related_object_fields method is modifying the form fields based on the pid parameter, suggesting that the application is managing access control and authorization based on some product or project ID. |
Filename | dojo/filters.py |
CodeLink | django-DefectDojo/dojo/filters.py Lines 1664 to 1734 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/filters.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains two functions, filter_queryset() and get_authorized_findings() , that appear to be related to authorization or access control. The filter_queryset() function is used to filter the queryset to only include findings that the user is authorized to view, based on the Permissions.Finding_View permission. This suggests that the code is handling authorization-related functionality. |
Filename | dojo/filters.py |
CodeLink | django-DefectDojo/dojo/filters.py Lines 1812 to 1864 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/finding/views.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains the function get_authorized_findings , which appears to be related to authorization and access control. This function is used to filter the queryset of findings based on the user's permissions, which suggests that it is part of an authentication or authorization mechanism. |
Filename | dojo/finding/views.py |
CodeLink | django-DefectDojo/dojo/finding/views.py Lines 612 to 620 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/metrics/views.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code imports the Dojo_User model, which suggests that there are likely functions related to user authentication and authorization present in the codebase. The Dojo_User model would typically be used to manage user accounts, including features such as login, logout, and access control. |
Filename | dojo/metrics/views.py |
CodeLink | django-DefectDojo/dojo/metrics/views.py Lines 20 to 26 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/finding_group/views.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains functions related to authentication or authorization, such as get_system_setting and create_notification , which are likely used for managing user permissions and notifications. |
Filename | dojo/finding_group/views.py |
CodeLink | django-DefectDojo/dojo/finding_group/views.py Lines 1 to 8 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/finding_group/views.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains the user_has_permission_or_403() function, which is likely used for authorization purposes. This function is called to check if the user has permission to view the product or engagement associated with the finding group. Additionally, the code references the Permissions class, which suggests the presence of an authorization system. |
Filename | dojo/finding_group/views.py |
CodeLink | django-DefectDojo/dojo/finding_group/views.py Lines 25 to 54 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/product/views.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains several import statements that suggest the presence of functions related to authentication or authorization, such as ProductFilter , EngagementFilter , and JIRAFindingForm . These filters and forms are likely used to manage user access and permissions within the application. |
Filename | dojo/product/views.py |
CodeLink | django-DefectDojo/dojo/product/views.py Lines 26 to 32 in 0d27468 |
⚠️ Potential Authn/Authz Function Used or Modified dojo/search/views.py (click for details)
Type | Potential Authn/Authz Function Used or Modified |
Description | The code contains imports for dojo.models and dojo.utils , which likely contain functions related to authentication or authorization. The dojo.finding.views and dojo.endpoint.views modules also suggest the presence of functions that might be involved in managing user access to application resources. |
Filename | dojo/search/views.py |
CodeLink | django-DefectDojo/dojo/search/views.py Lines 6 to 16 in 0d27468 |