Skip to content

Change to reactivating risk accepted findings#14633

Open
Jino-T wants to merge 2 commits intoDefectDojo:bugfixfrom
Jino-T:Re-activate-risk-acceptance
Open

Change to reactivating risk accepted findings#14633
Jino-T wants to merge 2 commits intoDefectDojo:bugfixfrom
Jino-T:Re-activate-risk-acceptance

Conversation

@Jino-T
Copy link
Copy Markdown
Contributor

@Jino-T Jino-T commented Apr 3, 2026

No description provided.

Maffooch added a commit that referenced this pull request Apr 14, 2026
Gate the remove_finding POST branch on edit_mode so only the edit URL
(requiring Risk_Acceptance permission) can process finding removals.
Scope the finding lookup to risk_acceptance.accepted_findings to prevent
cross-product blind enumeration via sequential IDs.

Add 6 security tests covering: edit_mode guard, scoped lookup, cross-product
IDOR, decorator enforcement, and positive regression.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Jino-T and others added 2 commits April 14, 2026 16:36
Gate the remove_finding POST branch on edit_mode so only the edit URL
(requiring Risk_Acceptance permission) can process finding removals.
Scope the finding lookup to risk_acceptance.accepted_findings to prevent
cross-product blind enumeration via sequential IDs.

Add 6 security tests covering: edit_mode guard, scoped lookup, cross-product
IDOR, decorator enforcement, and positive regression.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@Maffooch Maffooch force-pushed the Re-activate-risk-acceptance branch from f4fec7c to 02b3e7b Compare April 14, 2026 22:36
@Maffooch Maffooch changed the base branch from dev to bugfix April 14, 2026 22:37
@Maffooch Maffooch marked this pull request as ready for review April 14, 2026 22:57
@Maffooch Maffooch added this to the 2.57.2 milestone Apr 14, 2026
@dryrunsecurity
Copy link
Copy Markdown

DryRun Security

This pull request includes a sensitive edit to dojo/engagement/views.py (a configured codepath alert), indicating modifications to a protected file path; reviewers should confirm the change is authorized per .dryrunsecurity.yaml and verify the author and contents.

🔴 Configured Codepaths Edit in dojo/engagement/views.py (drs_37a60259)
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.

We've notified @mtesauro.


Comment to provide feedback on these findings.

Report false positive: @dryrunsecurity fp [FINDING ID] [FEEDBACK]
Report low-impact: @dryrunsecurity nit [FINDING ID] [FEEDBACK]

Example: @dryrunsecurity fp drs_90eda195 This code is not user-facing

All finding details can be found in the DryRun Security Dashboard.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants