-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible issue with pip detection #112
Comments
@rawrmonster17 thanks for raising this. Would be possible for you push a public image to a container registry that demonstrates this issue? I’m happy to look into it. |
This is not only for docker-scout, I believe it's because you create virtual environment by using |
Is there a public image somewhere that would let me reproduce this? |
Here is my setup.
server.Dockerfile
build.sh
poetry.zip put everything in a single directory and run build.sh like following
What I managed to understand is that
is the root cause, you can remove it from the docker image and just copy single file or folder and the issue is gone. |
i'm also facing the same issue, |
To dig into where this package and thus the CVE is being detected from, it usually easiest to use the
So, even though there is no debian or similar pip package installed in this image, there are still traces of the installation on the filesystem of the container that trigger this CVE. In this example it is add the path |
I fully understand that pip has a weird vulnerability cve-2018-20225 but even if you uninstall pip and pip3 docker scout is still showing this vulnerability. My question is does any package installed by pip still cause this cve? I thought it was only the pip package its self due to the way it could install packages incorrectly using the --extra-index-url flag.
The text was updated successfully, but these errors were encountered: