Skip to content
This repository has been archived by the owner on Jan 5, 2023. It is now read-only.

Resolve SQLAlchemy dependency vulnerabilities #553

Closed
1 task
adborden opened this issue Jan 12, 2021 · 8 comments
Closed
1 task

Resolve SQLAlchemy dependency vulnerabilities #553

adborden opened this issue Jan 12, 2021 · 8 comments
Assignees

Comments

@adborden
Copy link
Contributor

adborden commented Jan 12, 2021

Please keep any sensitive details in Google Drive.

Date of report: 9/10/2020
Severity: high
Due date: 10/10/2020

Due date is based on severity and described in RA-5. 15-days for Critical, 30-days for High, and 90-days for Moderate and lower.

  • Analysis has been performed and an issue has been linked to address other occurrences for this class of vulnerability* (link)

* When a finding is identified, we create two issues. One to address the specific instance identified in the report. The other is to identify and address all other occurrences of this vulnerability within the application.

Brief description

https://snyk.io/vuln/SNYK-PYTHON-SQLALCHEMY-590109
GSA/catalog.data.gov#112

https://snyk.io/vuln/SNYK-PYTHON-SQLALCHEMY-173678
GSA/catalog.data.gov#119

@adborden
Copy link
Contributor Author

If upgrading SQLAlchemy is not an option, we'll have to identify an alternative https://github.com/GSA/datagov-deploy/wiki/Dependency-scanning#triage-walkthrough

@adborden
Copy link
Contributor Author

I've lumped two sqlalchemy issues in here together, but we should split them out if the work is different.

@thejuliekramer
Copy link
Contributor

@FuhuXia @jbrown-xentity did you have to make change for this vulnerability in catalog classic?

@thejuliekramer
Copy link
Contributor

@avdata99 is going to reach out to the CKAN community to see if anyone has taken steps to tackle this in older versions of CKAN

@avdata99
Copy link
Contributor

Following here and internally with my team

@avdata99 avdata99 self-assigned this Jan 12, 2021
@adborden
Copy link
Contributor Author

FYI, any exceptions/resolutions we make are documented in the .snyk file. For SNYK-PYTHON-SQLALCHEMY-173678, we determined that CKAN 2.3 did not use the group_by or order_by parameters and therefore no fix is needed.

Oddly, SNYK-PYTHON-SQLALCHEMY-590109 lists a similar exception, but that doesn't make sense regarding the vulnerability description. @pjsharpe07 are you sure that one is correct?

@adborden
Copy link
Contributor Author

One option we discussed was to fork SQLAlchemy and apply this patch sqlalchemy/sqlalchemy@d3ba45c for https://snyk.io/vuln/SNYK-PYTHON-SQLALCHEMY-590109

@avdata99
Copy link
Contributor

Moving to TODO since we postposed this

@ghost ghost unassigned avdata99 Jan 25, 2021
@ghost ghost closed this as completed Feb 8, 2021
This issue was closed.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants