UNCLASSIFIED - NO CUI

Skip to content

chore(findings): appgate/sdp-operator

Summary

appgate/sdp-operator has 61 new findings discovered during continuous monitoring.

Layer: opensource/python:v3.11.8 is EOL, please update if possible

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=appgate/sdp-operator&tag=0.4.5&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2024-23334 Twistlock CVE High aiohttp-3.8.5 Most people use aiohttp as a server, but some dont. Avoid serving files with symlinks. 0.93615 false
CVE-2024-39689 Twistlock CVE High certifi-2023.7.22 0.21233 false
CVE-2023-50782 Twistlock CVE High cryptography-41.0.4 0.00707 false
CVE-2023-49083 Twistlock CVE High cryptography-41.0.4 0.00590 false
CVE-2024-27306 Twistlock CVE Medium aiohttp-3.8.5 Most users will not use aiohttp for static assets or allow custom filename uploads to the static directory. Dont enable showindex. 0.00508 false
CVE-2024-26130 Twistlock CVE High cryptography-41.0.4 0.00341 false
CVE-2024-3651 Twistlock CVE Medium idna-3.4 0.00338 false
CVE-2024-22190 Twistlock CVE High gitpython-3.1.37 0.00273 false
CVE-2024-30251 Twistlock CVE High aiohttp-3.8.5 Any user of the serverside web framework with POST endpoints may be affected. 0.00271 false
CVE-2024-42367 Anchore CVE Medium aiohttp-3.8.5 Requires using static routes via aiohttp not recommended practice and some way for an attacker to get a symlink into the servers static directory. Use a reverse proxy or ensure that symlinks cant be put into the static directory by users. 0.00267 false
CVE-2023-49081 Twistlock CVE Medium aiohttp-3.8.5 Most people use aiohttp as a server. 0.00242 false
CVE-2024-23829 Twistlock CVE Medium aiohttp-3.8.5 Most people use aiohttp as a server, but some dont. 0.00230 false
CVE-2024-0727 Twistlock CVE Medium cryptography-41.0.4 0.00214 false
CVE-2024-37891 Twistlock CVE Medium urllib3-1.26.17 Theres no reason to set ProxyAuthorization without using urllib3s proxy support. Using the ProxyAuthorization header with urllib3s ProxyManager. Disabling HTTP redirects using redirectsFalse when sending requests. Not using the ProxyAuthorization header. 0.00193 false
CVE-2024-52304 Twistlock CVE Medium aiohttp-3.8.5 Most users do not use the Python parser. Use the default C parser. 0.00168 false
CVE-2023-47627 Twistlock CVE Medium aiohttp-3.8.5 We expect that most people dont use the slower Python parser. Stop using AIOHTTPNOEXTENSIONS and use the default Cythonbased parser. 0.00166 false
CVE-2023-49082 Twistlock CVE Medium aiohttp-3.8.5 Most people use aiohttp as a server, not client. 0.00159 false
CVE-2017-1000383 Twistlock CVE Low emacs-27.2-14.el9_6.2 0.00142 false
CVE-2023-45803 Twistlock CVE Medium urllib3-1.26.17 No exploits from real world were reported Disable redirects for services that you arent expecting to respond with redirects with redirectsFalse.Disable automatic redirects with redirectsFalse and handle 303 redirects manually by stripping the HTTP request body. 0.00055 false
CVE-2023-50495 Anchore CVE Low ncurses-6.2-10.20210508.el9_6.2 0.00050 false
CVE-2025-53643 Twistlock CVE Low aiohttp-3.8.5 If the above conditions are met which is already unlikely, they are affected. 0.00044 false
CVE-2025-32728 Twistlock CVE Medium openssh-8.7p1-45.el9 0.00033 false
CVE-2025-32728 Anchore CVE Medium openssh-clients-8.7p1-45.el9 0.00033 false
CVE-2025-32728 Anchore CVE Medium openssh-8.7p1-45.el9 0.00033 false
CVE-2024-47081 Twistlock CVE Medium requests-2.31.0 0.00028 false
CVE-2024-35195 Twistlock CVE Medium requests-2.31.0 0.00022 false
CVE-2025-50181 Twistlock CVE Medium urllib3-1.26.17 Most users dont disable redirects on the PoolManager. Set redirectsFalseredirects0 on the .request call instead of on the toplevel urllib3.PoolManager 0.00015 false
CVE-2025-48386 Twistlock CVE Medium git-2.47.3-1.el9_6 0.00015 false
CVE-2025-48386 Anchore CVE Medium perl-Git-2.47.3-1.el9_6 0.00015 false
CVE-2025-48386 Anchore CVE Medium git-2.47.3-1.el9_6 0.00015 false
CVE-2025-48386 Anchore CVE Medium git-core-2.47.3-1.el9_6 0.00015 false
CVE-2025-48386 Anchore CVE Medium git-core-doc-2.47.3-1.el9_6 0.00015 false
CVE-2023-51767 Twistlock CVE Medium openssh-8.7p1-45.el9 0.00005 false
CVE-2023-51767 Anchore CVE Medium openssh-clients-8.7p1-45.el9 0.00005 false
CVE-2023-51767 Anchore CVE Medium openssh-8.7p1-45.el9 0.00005 false
GHSA-qvrw-v9rv-5rjx Anchore CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-q3qx-c6g2-7pw2 Anchore CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-pq67-6m6q-mj2v Anchore CVE Medium urllib3-1.26.17 N/A N/A
GHSA-pjjw-qhg8-p2p9 Twistlock CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-pjjw-qhg8-p2p9 Anchore CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-jjg7-2v4v-x38h Anchore CVE Medium idna-3.4 N/A N/A
GHSA-jfhm-5ghh-2f97 Anchore CVE Medium cryptography-41.0.4 N/A N/A
GHSA-h4gh-qq45-vh27 Twistlock CVE Medium cryptography-41.0.4 N/A N/A
GHSA-h4gh-qq45-vh27 Anchore CVE Medium cryptography-41.0.4 N/A N/A
GHSA-gfw2-4jvh-wgfg Anchore CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-g4mx-q9vg-27p4 Anchore CVE Medium urllib3-1.26.17 N/A N/A
GHSA-9wx4-h78v-vm56 Anchore CVE Medium requests-2.31.0 N/A N/A
GHSA-9v9h-cgj8-h64p Anchore CVE Medium cryptography-41.0.4 N/A N/A
GHSA-9hjg-9r4m-mvj7 Anchore CVE Medium requests-2.31.0 N/A N/A
GHSA-9548-qrrj-x5pj Anchore CVE Low aiohttp-3.8.5 N/A N/A
GHSA-8qpw-xqxj-h4r2 Anchore CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-8495-4g3g-x7pr Anchore CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-7gpw-8wmc-pm8g Anchore CVE Medium aiohttp-3.8.5 N/A N/A
GHSA-6vqw-3v5j-54x4 Anchore CVE High cryptography-41.0.4 N/A N/A
GHSA-5m98-qgg9-wh84 Anchore CVE High aiohttp-3.8.5 N/A N/A
GHSA-5h86-8mv2-jq9f Anchore CVE High aiohttp-3.8.5 N/A N/A
GHSA-3ww4-gg4f-jr7f Anchore CVE High cryptography-41.0.4 N/A N/A
GHSA-34jh-p97f-mpxf Anchore CVE Medium urllib3-1.26.17 N/A N/A
GHSA-2mqj-m65w-jghx Anchore CVE High GitPython-3.1.37 N/A N/A
GHSA-248v-346w-9cwc Anchore CVE Low certifi-2023.7.22 N/A N/A
1c6604e29f680ebf0d76b0348be1969f Anchore Compliance Critical N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=appgate/sdp-operator&tag=0.4.5&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information