You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**NOTE: ** The score was derived from the highest vulnerability in the software dependency package.
Description:
While conducting a security review of DeepSeek, we observed the noted web application used outdated 3P software with known vulnerabilities. The risks associated with using such dependencies are significant and include security vulnerabilities, data breaches, malware infections, compliance violations, and reputation damage.
Impact:
These vulnerabilities can be exploited by attackers to compromise the system, steal sensitive data, infect it with malware, violate industry regulations, and harm the organization's reputation. Outdated software is often no longer supported by its developers, which means that any security vulnerabilities that are discovered are unlikely to be patched. This makes it easier for hackers to exploit these vulnerabilities and gain access to our system or steal our data.
Testing /Users/gbiagomba/Projects/DeepSeek/src...
Tested 23 dependencies for known issues, found 5 issues, 11 vulnerable paths.
Issues to fix by upgrading dependencies:
Pin [email protected] to [email protected] to fix
✗ Insufficient Verification of Data Authenticity [Medium Severity][https://security.snyk.io/vuln/SNYK-PYTHON-CERTIFI-7430173] in [email protected]
introduced by [email protected] > [email protected] > [email protected] and 2 other path(s)
Pin [email protected] to [email protected] to fix
✗ Template Injection [Medium Severity][https://security.snyk.io/vuln/SNYK-PYTHON-JINJA2-8548181] in [email protected]
introduced by [email protected] > [email protected]
✗ Improper Neutralization [Medium Severity][https://security.snyk.io/vuln/SNYK-PYTHON-JINJA2-8548987] in [email protected]
introduced by [email protected] > [email protected]
Pin [email protected] to [email protected] to fix
✗ Injection [Medium Severity][https://security.snyk.io/vuln/SNYK-PYTHON-TQDM-6807582] in [email protected]
introduced by [email protected] > [email protected] and 2 other path(s)
Pin [email protected] to [email protected] to fix
✗ Improper Removal of Sensitive Information Before Storage or Transfer [Medium Severity][https://security.snyk.io/vuln/SNYK-PYTHON-URLLIB3-7267250] in [email protected]
introduced by [email protected] > [email protected] > [email protected] and 2 other path(s)
Organization: gbiagomba
Package manager: pip
Target file: DeepSeek-V3/inference/requirements.txt
Project name: inference
Open source: no
Project path: /Users/gbiagomba/Projects/DeepSeek/src
Licenses: enabled
Tip: Try `snyk fix` to address these issues.`snyk fix` is a new CLI command in that aims to automatically apply the recommended updates for supported ecosystems.
See documentation on how to enable this beta feature: https://docs.snyk.io/snyk-cli/fix-vulnerabilities-from-the-cli/automatic-remediation-with-snyk-fix#enabling-snyk-fix
Error:
Testing /app...
Failed to get dependencies for all 1 potential projects.
Tip: Re-run in debug mode to see more information: DEBUG=*snyk* <COMMAND>
If the issue persists contact [email protected]
at test (/snapshot/snyk/dist/cli/webpack:/snyk/src/cli/commands/test/index.ts:298:19)
at runCommand (/snapshot/snyk/dist/cli/webpack:/snyk/src/cli/main.ts:56:25)
at main (/snapshot/snyk/dist/cli/webpack:/snyk/src/cli/main.ts:343:11)
at /snapshot/snyk/dist/cli/webpack:/snyk/src/cli/index.ts:13:3
at callHandlingUnexpectedErrors (/snapshot/snyk/dist/cli/webpack:/snyk/src/lib/unexpected-error.ts:28:5)
Navigate to the impacted repo (locally) & run the following command: dependency-check --prettyPrint --format ALL --out "$PWD/../" --scan "$PWD"
Open either the CSV file or HTML file for results
Mitigation/Remediation:
We recommend updating the affected software to the latest supported version. Additionally, we recommend hardening the system after patching and ensuring all installed software including the noted software are patched. For more details, please the references below!
Be advised, the above patch should be applied to all other system(s) running the impacted software that are managed by the team.
Risk: High (8.8)
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
**NOTE: ** The score was derived from the highest vulnerability in the software dependency package.
Description:
While conducting a security review of
DeepSeek
, we observed the noted web application used outdated 3P software with known vulnerabilities. The risks associated with using such dependencies are significant and include security vulnerabilities, data breaches, malware infections, compliance violations, and reputation damage.Impact:
These vulnerabilities can be exploited by attackers to compromise the system, steal sensitive data, infect it with malware, violate industry regulations, and harm the organization's reputation. Outdated software is often no longer supported by its developers, which means that any security vulnerabilities that are discovered are unlikely to be patched. This makes it easier for hackers to exploit these vulnerabilities and gain access to our system or steal our data.
Affected Assets:
Affected Software:
Evidence:
depscan:
snyk:
trivy:
Replicate Finding:
git clone https://github.com/jeremylong/DependencyCheck
dependency-check --prettyPrint --format ALL --out "$PWD/../" --scan "$PWD"
Mitigation/Remediation:
We recommend updating the affected software to the latest supported version. Additionally, we recommend hardening the system after patching and ensuring all installed software including the noted software are patched. For more details, please the references below!
Be advised, the above patch should be applied to all other system(s) running the impacted software that are managed by the team.
References:
The text was updated successfully, but these errors were encountered: