-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Snyk] OWSLib Vulnerability #4231
Comments
For one thing--check on the need of the existing CSW harvest sources. Perhaps not use the CSW harvest source at all but get single harvest record. |
We might fix on our own. Also XML from trusted sources. |
@btylerburton It seems like the CSW Harvest source is failing on main with the older version of 000_harvest.cy.js.mp4 |
We are still working on the solution... GSA/data.gov#4231
This is an ongoing issue and it is unnecessarily holding up our pipeline... GSA/data.gov#4231
The upgrades to |
Leaving open as the vulnerability will still need to be addressed. Moving to blocked until we do that. |
Fixed in GSA/catalog.data.gov#921 |
For full transparency, I believe this is the starting point for why/when/how we stopped supporting CSW Harvesting. |
Please keep any sensitive details in Google Drive.
Date of report: 03/09/2023
Severity: High
Due date: 04/09/2023
Due date is based on severity and described in RA-5. 15-days for Critical, 30-days for High, and 90-days for Moderate and lower.
* When a finding is identified, we create two issues. One to address the specific instance identified in the report. The other is to identify and address all other occurrences of this vulnerability within the application.
Brief description
From our automated snyk scans, the above vulnerability in the
owslib
package was highlighted. After an investigation of our Github Action Tests, it seems like it is breaking the CSW Harvest Jobs.The text was updated successfully, but these errors were encountered: