You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The repository was scanned on the subject of security vulnerabilities using Snyk tool.
Here is a list with high severity vulnerabilities:
CWE-23: Unsanitized input from an HTTP parameter flows into open, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to write arbitrary files.
CWE-23: Unsanitized input from an HTTP parameter flows into flask.send_file, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to write arbitrary files.
CWE-23: Unsanitized input from an HTTP parameter flows into shutil.rmtree, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to write arbitrary files.
CWE-78: Unsanitized input from an HTTP parameter flows into os.popen, where it is used as a shell command. This may result in a Command Injection vulnerability.
The repository was scanned on the subject of security vulnerabilities using Snyk tool.
Here is a list with high severity vulnerabilities:
CWE-23: Unsanitized input from an HTTP parameter flows into open, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to write arbitrary files.
allure-docker-service/allure-docker-api/app.py
Line 1170 in aeb786e
CWE-23: Unsanitized input from an HTTP parameter flows into flask.send_file, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to write arbitrary files.
allure-docker-service/allure-docker-api/app.py
Line 1208 in aeb786e
CWE-23: Unsanitized input from an HTTP parameter flows into shutil.rmtree, where it is used as a path. This may result in a Path Traversal vulnerability and allow an attacker to write arbitrary files.
allure-docker-service/allure-docker-api/app.py
Line 1328 in aeb786e
CWE-78: Unsanitized input from an HTTP parameter flows into os.popen, where it is used as a shell command. This may result in a Command Injection vulnerability.
allure-docker-service/allure-docker-api/app.py
Line 1654 in aeb786e
Is it possible to fix them?
Thanks!
The text was updated successfully, but these errors were encountered: