You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The application was found passing in a non-literal value to the urllib methods which issue
requests. urllib supports the file:// scheme, which may allow an adversary who can control
the URL value to read arbitrary files on the file system.
To remediate this issue either hardcode the URLs being used in urllib or use the requests
module instead.
Example using the requests module to issue an HTTPS request:
import requests
# Issue a GET request to https://example.com with a timeout of 10 seconds
response = requests.get('https://example.com', timeout=10)
# Work with the response object
# ...
I don't think this is an issue in our case, as we actually hardcode the url to be a https link to our gitlab repo. There is no way to change this link to for example the dangerous //file destination.
In GitLab by @bentvelsen on Jan 30, 2024, 11:33
Issue created from vulnerability 101832940
Description:
The application was found passing in a non-literal value to the
urllib
methods which issuerequests.
urllib
supports thefile://
scheme, which may allow an adversary who can controlthe URL value to read arbitrary files on the file system.
To remediate this issue either hardcode the URLs being used in urllib or use the
requests
module instead.
Example using the
requests
module to issue an HTTPS request:Identifiers:
Scanner:
The text was updated successfully, but these errors were encountered: