Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS Inspector reports HIgh vulnerbility in examples/pipenv.lock #6342

Open
kuzin2006 opened this issue Feb 12, 2025 · 0 comments
Open

AWS Inspector reports HIgh vulnerbility in examples/pipenv.lock #6342

kuzin2006 opened this issue Feb 12, 2025 · 0 comments

Comments

@kuzin2006
Copy link

Be sure to check the existing issues (both open and closed!), and make sure you are running the latest version of Pipenv.

Check the diagnose documentation for common issues before posting! We may close your issue if it is very similar to one of them. Please be considerate, or be on your way.

Make sure to mention your debugging experience if the documented solution failed.

Issue description

AWS Inspector run returns High severity finding on builds with pipenv for examples/pipenv.lock. The file's example data leads to reporting of high severity vulnerability, breaking our product pipelines.

Expected result

No issues

Actual result

Report fragment:

{
            "SchemaVersion": "2018-10-08",
            "ProductArn": "arn:aws:securityhub:us-east-1::product/aws/inspector",
            "ProductName": "Inspector",
            "CompanyName": "Amazon",
            "Region": "us-east-1",
            "GeneratorId": "AWSInspector",
            "Types": [
                "Software and Configuration Checks/Vulnerabilities/CVE"
            ],
            "FirstObservedAt": "2025-01-28T15:27:08.842Z",
            "LastObservedAt": "2025-02-04T08:12:52.044Z",
            "CreatedAt": "2025-01-28T15:27:08.842Z",
            "UpdatedAt": "2025-02-04T08:12:52.044Z",
            "Severity": {
                "Label": "HIGH",
                "Normalized": 70
            },
            "Title": "CVE-2024-3651 - idna",
            "Description": "A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.",
            "Remediation": {
                "Recommendation": {
                    "Text": "Remediation is available. Please refer to the Fixed version in the vulnerability details section above.For detailed remediation guidance for each of the affected packages, refer to the vulnerabilities section of the detailed finding JSON."
                }
            },
            "ProductFields": {
                "aws/inspector/ProductVersion": "2",
                "aws/inspector/FindingStatus": "ACTIVE",
                "aws/inspector/inspectorScore": "7.5",
                "aws/inspector/resources/1/resourceDetails/awsEcrContainerImageDetails/platform": "DEBIAN_12",
                "aws/inspector/packageVulnerabilityDetails/vulnerablePackages/sourceLayerHashes": "sha256:2afed5f3dce86d2b6d5c99c72109e30528fe90b39fcad341d3b9a9232b5089bb",
                "aws/securityhub/FindingId": "arn:aws:securityhub:us-east-1::product/aws/inspector/arn:aws:inspector2:us-east-1:588145730505:finding/8ebe3faa369f1f162815e6f6ef46ebc9",
                "aws/securityhub/ProductName": "Inspector",
                "aws/securityhub/CompanyName": "Amazon"
            },
            "Resources": [
                {
                    "Type": "AwsEcrContainerImage",
                    "Partition": "aws",
                    "Region": "us-east-1",
                    
            ],
            "WorkflowState": "NEW",
            "Workflow": {
                "Status": "NEW"
            },
            "RecordState": "ACTIVE",
            "Vulnerabilities": [
                {
                    "Id": "CVE-2024-3651",
                    "VulnerablePackages": [
                        {
                            "Name": "idna",
                            "Version": "3.4",
                            "Epoch": "0",
                            "PackageManager": "PYTHON",
                            "FilePath": "usr/local/lib/python3.11/site-packages/examples/Pipfile.lock",
                            "FixedInVersion": "3.7",
                            "SourceLayerHash": "sha256:2afed5f3dce86d2b6d5c99c72109e30528fe90b39fcad341d3b9a9232b5089bb"
                        }
                    ],
                    "Cvss": [
                        {
                            "Version": "3.1",
                            "BaseScore": 7.5,
                            "BaseVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                            "Source": "NVD"
                        },
                        {
                            "Version": "3.1",
                            "BaseScore": 7.5,
                            "BaseVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                            "Source": "NVD"
                        }
                    ],
                    "Vendor": {
                        "Name": "NVD",
                        "Url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3651",
                        "VendorSeverity": "HIGH",
                        "VendorCreatedAt": "2024-07-07T18:15:09.000Z",
                        "VendorUpdatedAt": "2024-11-21T09:30:05.000Z"
                    },
                    "ReferenceUrls": [
                        "https://nvd.nist.gov/vuln/detail/CVE-2024-3651"
                    ],
                    "FixAvailable": "YES",
                    "EpssScore": 0.00046,
                    "ExploitAvailable": "NO"
                }
            ],
            "FindingProviderFields": {
                "Severity": {
                    "Label": "HIGH"
                },
                "Types": [
                    "Software and Configuration Checks/Vulnerabilities/CVE"
                ]
            },
            "ProcessedAt": "2025-02-04T08:13:04.254Z"
        }

Steps to replicate

The mentioned above is a result of automated job run.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant