chore(findings): appgate/sdp-operator
Summary
appgate/sdp-operator has 61 new findings discovered during continuous monitoring.
Layer: opensource/python:v3.11.8 is EOL, please update if possible
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=appgate/sdp-operator&tag=0.4.5&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
id | source | severity | package | impact | workaround | epss_score | kev |
---|---|---|---|---|---|---|---|
CVE-2024-23334 | Twistlock CVE | High | aiohttp-3.8.5 | Most people use aiohttp as a server, but some dont. | Avoid serving files with symlinks. | 0.93615 | false |
CVE-2024-39689 | Twistlock CVE | High | certifi-2023.7.22 | 0.21233 | false | ||
CVE-2023-50782 | Twistlock CVE | High | cryptography-41.0.4 | 0.00707 | false | ||
CVE-2023-49083 | Twistlock CVE | High | cryptography-41.0.4 | 0.00590 | false | ||
CVE-2024-27306 | Twistlock CVE | Medium | aiohttp-3.8.5 | Most users will not use aiohttp for static assets or allow custom filename uploads to the static directory. | Dont enable showindex. | 0.00508 | false |
CVE-2024-26130 | Twistlock CVE | High | cryptography-41.0.4 | 0.00341 | false | ||
CVE-2024-3651 | Twistlock CVE | Medium | idna-3.4 | 0.00338 | false | ||
CVE-2024-22190 | Twistlock CVE | High | gitpython-3.1.37 | 0.00273 | false | ||
CVE-2024-30251 | Twistlock CVE | High | aiohttp-3.8.5 | Any user of the serverside web framework with POST endpoints may be affected. | 0.00271 | false | |
CVE-2024-42367 | Anchore CVE | Medium | aiohttp-3.8.5 | Requires using static routes via aiohttp not recommended practice and some way for an attacker to get a symlink into the servers static directory. | Use a reverse proxy or ensure that symlinks cant be put into the static directory by users. | 0.00267 | false |
CVE-2023-49081 | Twistlock CVE | Medium | aiohttp-3.8.5 | Most people use aiohttp as a server. | 0.00242 | false | |
CVE-2024-23829 | Twistlock CVE | Medium | aiohttp-3.8.5 | Most people use aiohttp as a server, but some dont. | 0.00230 | false | |
CVE-2024-0727 | Twistlock CVE | Medium | cryptography-41.0.4 | 0.00214 | false | ||
CVE-2024-37891 | Twistlock CVE | Medium | urllib3-1.26.17 | Theres no reason to set ProxyAuthorization without using urllib3s proxy support. | Using the ProxyAuthorization header with urllib3s ProxyManager. Disabling HTTP redirects using redirectsFalse when sending requests. Not using the ProxyAuthorization header. | 0.00193 | false |
CVE-2024-52304 | Twistlock CVE | Medium | aiohttp-3.8.5 | Most users do not use the Python parser. | Use the default C parser. | 0.00168 | false |
CVE-2023-47627 | Twistlock CVE | Medium | aiohttp-3.8.5 | We expect that most people dont use the slower Python parser. | Stop using AIOHTTPNOEXTENSIONS and use the default Cythonbased parser. | 0.00166 | false |
CVE-2023-49082 | Twistlock CVE | Medium | aiohttp-3.8.5 | Most people use aiohttp as a server, not client. | 0.00159 | false | |
CVE-2017-1000383 | Twistlock CVE | Low | emacs-27.2-14.el9_6.2 | 0.00142 | false | ||
CVE-2023-45803 | Twistlock CVE | Medium | urllib3-1.26.17 | No exploits from real world were reported | Disable redirects for services that you arent expecting to respond with redirects with redirectsFalse.Disable automatic redirects with redirectsFalse and handle 303 redirects manually by stripping the HTTP request body. | 0.00055 | false |
CVE-2023-50495 | Anchore CVE | Low | ncurses-6.2-10.20210508.el9_6.2 | 0.00050 | false | ||
CVE-2025-53643 | Twistlock CVE | Low | aiohttp-3.8.5 | If the above conditions are met which is already unlikely, they are affected. | 0.00044 | false | |
CVE-2025-32728 | Twistlock CVE | Medium | openssh-8.7p1-45.el9 | 0.00033 | false | ||
CVE-2025-32728 | Anchore CVE | Medium | openssh-clients-8.7p1-45.el9 | 0.00033 | false | ||
CVE-2025-32728 | Anchore CVE | Medium | openssh-8.7p1-45.el9 | 0.00033 | false | ||
CVE-2024-47081 | Twistlock CVE | Medium | requests-2.31.0 | 0.00028 | false | ||
CVE-2024-35195 | Twistlock CVE | Medium | requests-2.31.0 | 0.00022 | false | ||
CVE-2025-50181 | Twistlock CVE | Medium | urllib3-1.26.17 | Most users dont disable redirects on the PoolManager. | Set redirectsFalseredirects0 on the .request call instead of on the toplevel urllib3.PoolManager | 0.00015 | false |
CVE-2025-48386 | Twistlock CVE | Medium | git-2.47.3-1.el9_6 | 0.00015 | false | ||
CVE-2025-48386 | Anchore CVE | Medium | perl-Git-2.47.3-1.el9_6 | 0.00015 | false | ||
CVE-2025-48386 | Anchore CVE | Medium | git-2.47.3-1.el9_6 | 0.00015 | false | ||
CVE-2025-48386 | Anchore CVE | Medium | git-core-2.47.3-1.el9_6 | 0.00015 | false | ||
CVE-2025-48386 | Anchore CVE | Medium | git-core-doc-2.47.3-1.el9_6 | 0.00015 | false | ||
CVE-2023-51767 | Twistlock CVE | Medium | openssh-8.7p1-45.el9 | 0.00005 | false | ||
CVE-2023-51767 | Anchore CVE | Medium | openssh-clients-8.7p1-45.el9 | 0.00005 | false | ||
CVE-2023-51767 | Anchore CVE | Medium | openssh-8.7p1-45.el9 | 0.00005 | false | ||
GHSA-qvrw-v9rv-5rjx | Anchore CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-q3qx-c6g2-7pw2 | Anchore CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-pq67-6m6q-mj2v | Anchore CVE | Medium | urllib3-1.26.17 | N/A | N/A | ||
GHSA-pjjw-qhg8-p2p9 | Twistlock CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-pjjw-qhg8-p2p9 | Anchore CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-jjg7-2v4v-x38h | Anchore CVE | Medium | idna-3.4 | N/A | N/A | ||
GHSA-jfhm-5ghh-2f97 | Anchore CVE | Medium | cryptography-41.0.4 | N/A | N/A | ||
GHSA-h4gh-qq45-vh27 | Twistlock CVE | Medium | cryptography-41.0.4 | N/A | N/A | ||
GHSA-h4gh-qq45-vh27 | Anchore CVE | Medium | cryptography-41.0.4 | N/A | N/A | ||
GHSA-gfw2-4jvh-wgfg | Anchore CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-g4mx-q9vg-27p4 | Anchore CVE | Medium | urllib3-1.26.17 | N/A | N/A | ||
GHSA-9wx4-h78v-vm56 | Anchore CVE | Medium | requests-2.31.0 | N/A | N/A | ||
GHSA-9v9h-cgj8-h64p | Anchore CVE | Medium | cryptography-41.0.4 | N/A | N/A | ||
GHSA-9hjg-9r4m-mvj7 | Anchore CVE | Medium | requests-2.31.0 | N/A | N/A | ||
GHSA-9548-qrrj-x5pj | Anchore CVE | Low | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-8qpw-xqxj-h4r2 | Anchore CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-8495-4g3g-x7pr | Anchore CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-7gpw-8wmc-pm8g | Anchore CVE | Medium | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-6vqw-3v5j-54x4 | Anchore CVE | High | cryptography-41.0.4 | N/A | N/A | ||
GHSA-5m98-qgg9-wh84 | Anchore CVE | High | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-5h86-8mv2-jq9f | Anchore CVE | High | aiohttp-3.8.5 | N/A | N/A | ||
GHSA-3ww4-gg4f-jr7f | Anchore CVE | High | cryptography-41.0.4 | N/A | N/A | ||
GHSA-34jh-p97f-mpxf | Anchore CVE | Medium | urllib3-1.26.17 | N/A | N/A | ||
GHSA-2mqj-m65w-jghx | Anchore CVE | High | GitPython-3.1.37 | N/A | N/A | ||
GHSA-248v-346w-9cwc | Anchore CVE | Low | certifi-2023.7.22 | N/A | N/A | ||
1c6604e29f680ebf0d76b0348be1969f | Anchore Compliance | Critical | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=appgate/sdp-operator&tag=0.4.5&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.