Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update README.md #119

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open

Update README.md #119

wants to merge 1 commit into from

Conversation

Yoavast
Copy link
Owner

@Yoavast Yoavast commented Aug 31, 2023

No description provided.

@github-actions
Copy link

Logo
Checkmarx One – Scan Summary & Details44e6172e-0702-4ec1-800f-3bb82365fdc1

New Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH ALB Listening on HTTP /positive2.tf: 70 AWS Application Load Balancer (alb) should not listen on HTTP
HIGH ALB Listening on HTTP /positive1.tf: 9 AWS Application Load Balancer (alb) should not listen on HTTP
HIGH CVE-2017-1000048 Npm-qs-6.0.0 Vulnerable Package
HIGH CVE-2019-10744 Npm-lodash-4.17.11 Vulnerable Package
HIGH CVE-2020-7212 Python-urllib3-1.25.7 Vulnerable Package
HIGH CVE-2020-8203 Npm-lodash-4.17.11 Vulnerable Package
HIGH CVE-2021-23337 Npm-lodash-4.17.11 Vulnerable Package
HIGH CVE-2021-28235 Go-go.etcd.io/etcd/server/v3-v3.5.0 Vulnerable Package
HIGH CVE-2021-33503 Python-urllib3-1.25.7 Vulnerable Package
HIGH CVE-2021-4229 Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH CVE-2022-1996 Go-github.com/emicklei/go-restful-v2.9.5 Vulnerable Package
HIGH CVE-2022-21698 Go-github.com/prometheus/client_golang-v1.11.0 Vulnerable Package
HIGH CVE-2022-24999 Npm-qs-6.0.0 Vulnerable Package
HIGH CVE-2022-25927 Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH CVE-2022-27191 Go-golang.org/x/crypto-v0.0.0-20211202192323-5770296d904e Vulnerable Package
HIGH CVE-2022-28948 Go-gopkg.in/yaml.v3-v3.0.0-20210107192922-496545a6307b Vulnerable Package
HIGH CVE-2022-32149 Go-golang.org/x/text-v0.3.7 Vulnerable Package
HIGH CVE-2022-34038 Go-go.etcd.io/etcd/pkg/v3-v3.5.0 Vulnerable Package
HIGH CVE-2022-41723 Go-golang.org/x/net-v0.0.0-20220225172249-27dd8689420f Vulnerable Package
HIGH CVE-2023-2253 Go-github.com/docker/distribution-v0.0.0-20180920194744-16128bbac47f Vulnerable Package
HIGH CVE-2023-30861 Python-Flask-2.0.2 Vulnerable Package
HIGH CVE-2023-37788 Go-github.com/elazarl/goproxy-v0.0.0-20180725130230-947c36da3153 Vulnerable Package
HIGH Cx0a21eeca-49b1 Npm-scs-0.0.1 Vulnerable Package
HIGH Cx0b414307-5d4b Npm-lodash-4.17.11 Vulnerable Package
HIGH Cx0b915a4a-2d97 Npm-scs-0.0.1 Vulnerable Package
HIGH Cx0eb7d3da-c52e Python-azure-powerbiembedded-6969.99.99 Vulnerable Package
HIGH Cx18e041aa-8a63 Npm-node-ipc-9.2.2 Vulnerable Package
HIGH Cx21f588f7-f9cb Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH Cx4ca27ec0-0c96 Npm-scs-0.0.1 Vulnerable Package
HIGH Cx4d89cd75-1e27 Python-azure-powerbiembedded-6969.99.99 Vulnerable Package
HIGH Cx68e4da20-b53a Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH Cx6bee2138-4df0 Npm-flow-dev-tools-99.10.9 Vulnerable Package
HIGH Cx6eb8ff4e-c9cf Npm-flow-dev-tools-99.10.9 Vulnerable Package
HIGH Cx7401d0a9-2786 Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH Cx8079a3fb-ff1f Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH Cx8147ddef-ae09 Python-azure-powerbiembedded-6969.99.99 Vulnerable Package
HIGH Cx86e7ca06-a018 Python-not-particularly-2.5.0 Vulnerable Package
HIGH Cx9f739bef-35bb Npm-flow-dev-tools-99.10.9 Vulnerable Package
HIGH Cxa45b0853-bee2 Npm-momnet-2.29.1 Vulnerable Package
HIGH Cxae9d1b09-2adb Npm-scs-0.0.1 Vulnerable Package
HIGH Cxb52dba53-66d2 Python-not-particularly-2.5.0 Vulnerable Package
HIGH Cxb667b900-bec1 Python-azure-powerbiembedded-6969.99.99 Vulnerable Package
HIGH Cxba94c01e-a95d Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH Cxbec87a55-fe55 Npm-node-ipc-9.2.2 Vulnerable Package
HIGH Cxc73fdf59-ac18 Npm-ua-parser-js-0.7.29 Vulnerable Package
HIGH Cxcc09496a-59c8 Npm-js-yaml-3.6.1 Vulnerable Package
HIGH Cxccd8b30c-808c Npm-scs-0.0.1 Vulnerable Package
HIGH Cxd55dbf56-4d06 Npm-scs-0.0.1 Vulnerable Package
HIGH Cxdca8e59f-8bfe Npm-inflight-1.0.6 Vulnerable Package
HIGH Cxec49316b-56df Npm-js-yaml-3.6.1 Vulnerable Package
HIGH Cxfd197ca1-b64b Npm-momnet-2.29.1 Vulnerable Package
HIGH EC2 Instance Has Public IP /negative2.tf: 96 EC2 Instance should not have a public IP address.
HIGH EC2 Instance Has Public IP /negative2.tf: 83 EC2 Instance should not have a public IP address.
HIGH EC2 Instance Has Public IP /positive2.tf: 95 EC2 Instance should not have a public IP address.
HIGH EC2 Instance Has Public IP /positive2.tf: 82 EC2 Instance should not have a public IP address.
HIGH EC2 Instance Has Public IP /negative2.tf: 109 EC2 Instance should not have a public IP address.
HIGH EC2 Instance Has Public IP /positive2.tf: 108 EC2 Instance should not have a public IP address.
HIGH Missing User Instruction /Dockerfile: 1 A user should be specified in the dockerfile, otherwise the image will run as root
MEDIUM ALB Not Dropping Invalid Headers /negative2.tf: 49 It's considered a best practice when using Application Load Balancers to drop invalid header fields
MEDIUM ALB Not Dropping Invalid Headers /positive2.tf: 49 It's considered a best practice when using Application Load Balancers to drop invalid header fields
MEDIUM ALB Not Dropping Invalid Headers /positive1.tf: 15 It's considered a best practice when using Application Load Balancers to drop invalid header fields
MEDIUM ALB Not Dropping Invalid Headers /negative1.tf: 15 It's considered a best practice when using Application Load Balancers to drop invalid header fields
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 5 When installing a package, its pin version should be defined
MEDIUM CVE-2020-26137 Python-urllib3-1.25.7 Vulnerable Package
MEDIUM CVE-2020-28500 Npm-lodash-4.17.11 Vulnerable Package
MEDIUM CVE-2020-8554 Go-k8s.io/api-v0.23.5 Vulnerable Package
MEDIUM CVE-2022-29526 Go-golang.org/x/sys-v0.0.0-20211216021012-1d35b9e2eb4e Vulnerable Package
MEDIUM CVE-2022-41717 Go-golang.org/x/net-v0.0.0-20220225172249-27dd8689420f Vulnerable Package
MEDIUM CVE-2023-32082 Go-go.etcd.io/etcd/server/v3-v3.5.0 Vulnerable Package
MEDIUM Cx3bb8deb1-b4c0 Npm-scs-0.0.1 Vulnerable Package
MEDIUM Cx3cf24ca3-dd23 Npm-ua-parser-js-0.7.29 Vulnerable Package
MEDIUM Cx65afcea4-5e85 Npm-event-pubsub-5.0.3 Vulnerable Package
MEDIUM Cx743605c8-a95e Npm-momnet-2.29.1 Vulnerable Package
MEDIUM Cxa29f6cb5-3c84 Python-azure-powerbiembedded-6969.99.99 Vulnerable Package
MEDIUM Cxba768ce4-aa4e Npm-node-ipc-9.2.2 Vulnerable Package
MEDIUM Cxc09edd5e-4a9e Npm-strong-type-0.1.6 Vulnerable Package
MEDIUM Cxf7a33198-8ff8 Npm-node-ipc-9.2.2 Vulnerable Package
MEDIUM VPC Without Network Firewall /negative2.tf: 26 VPC should have a Network Firewall associated
MEDIUM VPC Without Network Firewall /positive2.tf: 26 VPC should have a Network Firewall associated
LOW ALB Deletion Protection Disabled /positive2.tf: 49 Application Load Balancer should have deletion protection enabled
LOW ALB Deletion Protection Disabled /positive1.tf: 15 Application Load Balancer should have deletion protection enabled
LOW ALB Deletion Protection Disabled /negative2.tf: 49 Application Load Balancer should have deletion protection enabled
LOW ALB Deletion Protection Disabled /negative1.tf: 15 Application Load Balancer should have deletion protection enabled
LOW Cx786c6ee9-1022 Go-github.com/opencontainers/image-spec-v1.0.1 Vulnerable Package
LOW EC2 Instance Using Default Security Group /positive2.tf: 83 EC2 instances should not use default security group(s)
LOW EC2 Instance Using Default Security Group /positive2.tf: 109 EC2 instances should not use default security group(s)
LOW EC2 Instance Using Default Security Group /negative2.tf: 97 EC2 instances should not use default security group(s)
LOW EC2 Instance Using Default Security Group /negative2.tf: 84 EC2 instances should not use default security group(s)
LOW EC2 Instance Using Default Security Group /positive2.tf: 96 EC2 instances should not use default security group(s)
LOW EC2 Instance Using Default Security Group /negative2.tf: 110 EC2 instances should not use default security group(s)
LOW Healthcheck Instruction Missing /Dockerfile: 1 Ensure that HEALTHCHECK is being used. The HEALTHCHECK instruction tells Docker how to test a container to check that it is still working
LOW IAM Access Analyzer Not Enabled /negative1.tf: 1 IAM Access Analyzer should be enabled and configured to continuously monitor resource permissions
LOW Shield Advanced Not In Use /negative1.tf: 15 AWS Shield Advanced should be used for Amazon Route 53 hosted zone, AWS Global Accelerator accelerator, Elastic IP Address, Elastic Load Balancing,...
LOW Shield Advanced Not In Use /positive1.tf: 15 AWS Shield Advanced should be used for Amazon Route 53 hosted zone, AWS Global Accelerator accelerator, Elastic IP Address, Elastic Load Balancing,...
LOW Shield Advanced Not In Use /negative2.tf: 49 AWS Shield Advanced should be used for Amazon Route 53 hosted zone, AWS Global Accelerator accelerator, Elastic IP Address, Elastic Load Balancing,...
LOW Shield Advanced Not In Use /positive2.tf: 49 AWS Shield Advanced should be used for Amazon Route 53 hosted zone, AWS Global Accelerator accelerator, Elastic IP Address, Elastic Load Balancing,...
LOW VPC FlowLogs Disabled /positive2.tf: 26 Every VPC resource should have an associated Flow Log
LOW VPC FlowLogs Disabled /negative2.tf: 26 Every VPC resource should have an associated Flow Log

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant