cyber-dojo
flows
dashboard-archived-at-1707630840
artifacts
dbaa898538dbcb5eba0c6175a47f0d846b73fa133154e9d855ff88dc24e67240
By signing up, you agree to the
Terms of Service.
For more information about Kosli’s privacy practices, see the Kosli’s
Privacy Policy.
We’ll occasionally send you account-related emails.
We’ll occasionally send you account-related emails.
dashboard-archived-at-1707630840
UX for a group practice dashboard
cyberdojo/dashboard:e486c45
Non-compliant
Download Evidence Package
JSON
{ "created_at": 1705474691.8060846, "fingerprint": "dbaa898538dbcb5eba0c6175a47f0d846b73fa133154e9d855ff88dc24e67240", "filename": "cyberdojo/dashboard:e486c45", "git_commit": "e486c45c252720b668ba642d60d4004151b75a49", "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552139704", "commit_url": "https://github.com/cyber-dojo/dashboard/commit/e486c45c252720b668ba642d60d4004151b75a49", "evidence": { "snyk-scan": { "evidence_type": "snyk", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552139704", "evidence_archive_fingerprint": "3ee00ed52feb8b6298ace85248abb46e05514c58be68b97dbeef504f5a97a3b9", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/dashboard:e486c45/dashboard:e486c45:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/dashboard:e486c45:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 80, "displayTargetFile": "Dockerfile", "docker": { "baseImage": "cyberdojo/sinatra-base:6afffdb", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Recommendations for your base image (cyberdojo/sinatra-base:6afffdb) are not available.\nSee above for details and fixes on individual vulnerabilities" } ], "code": "UNTRACKED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": true, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/dashboard:e486c45/dashboard", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/dashboard", "summary": "14 vulnerable dependency paths", "targetFile": "Dockerfile", "uniqueCount": 1, "vulnerabilities": [ { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libcrypto3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", ".ruby-rundeps@20240108.230053", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "apk-tools/apk-tools@2.14.0-r2", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "busybox/ssl_client@1.36.1-r5", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "ca-certificates/ca-certificates@20230506-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "nodejs/nodejs@18.18.2-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libssl3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "apk-tools/apk-tools@2.14.0-r2", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "busybox/ssl_client@1.36.1-r5", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "nodejs/nodejs@18.18.2-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" } ] }, "created_at": 1705474719.113236, "has_audit_package": true }, "pull-request": { "evidence_type": "pull_request", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552139704", "commit_sha": "e486c45c252720b668ba642d60d4004151b75a49", "evidence_url": "https://github.com/cyber-dojo/dashboard/pull/108", "user_data": {}, "git_provider": "github", "pull_requests": [ { "merge_commit": "e486c45c252720b668ba642d60d4004151b75a49", "url": "https://github.com/cyber-dojo/dashboard/pull/108", "state": "closed", "approvers": [] } ], "created_at": 1705474682.5333822, "has_audit_package": false }, "lint": { "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552139704", "commit_sha": "e486c45c252720b668ba642d60d4004151b75a49", "evidence_archive_fingerprint": "30531584dcfd7cda89c91beeb4b3e9d73cc3c3e73a1fe03013d6a7b6021ed683", "user_data": {}, "created_at": 1705474687.3836572, "has_audit_package": true } }, "reported_by": "ci-pipelines", "git_commit_info": { "sha1": "e486c45c252720b668ba642d60d4004151b75a49", "message": "CI: run workflow after fixing incorrect kosli flag name (#108)", "author": "Jon Jagger <jon@kosli.com>", "timestamp": 1705474655, "branch": "main" }, "repo_url": "https://github.com/cyber-dojo/dashboard", "template": [ "artifact", "snyk-scan", "lint", "pull-request" ], "last_modified_at": 1705474719.113236, "state": "NON-COMPLIANT", "html_url": "https://app.kosli.com/cyber-dojo/flows/dashboard-archived-at-1707630840/artifacts/dbaa898538dbcb5eba0c6175a47f0d846b73fa133154e9d855ff88dc24e67240", "api_url": "https://app.kosli.com/api/v2/artifacts/cyber-dojo/dashboard-archived-at-1707630840/fingerprint/dbaa898538dbcb5eba0c6175a47f0d846b73fa133154e9d855ff88dc24e67240" }
Artifact Information |
|
Name | cyberdojo/dashboard:e486c45 |
Fingerprint | dbaa898538dbcb5eba0c6175a47f0d846b73fa133154e9d855ff88dc24e67240 |
Git commit |
e486c45
Jon Jagger <jon@kosli.com> (main)
1705474655.0 • 4 months ago
CI: run workflow after fixing incorrect kosli flag name (#108)
|
CI Build | https://github.com/cyber-dojo/dashboard/actions/runs/7552139704 |
Running | - |
Exited | - |
Last modified | 1705474719.113236 • 4 months ago |
Approvals
None |
Evidence
Evidence for 'snyk-scan'
{ "evidence_type": "snyk", "name": "snyk-scan", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552139704", "evidence_archive_fingerprint": "3ee00ed52feb8b6298ace85248abb46e05514c58be68b97dbeef504f5a97a3b9", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/dashboard:e486c45/dashboard:e486c45:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/dashboard:e486c45:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 80, "displayTargetFile": "Dockerfile", "docker": { "baseImage": "cyberdojo/sinatra-base:6afffdb", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Recommendations for your base image (cyberdojo/sinatra-base:6afffdb) are not available.\nSee above for details and fixes on individual vulnerabilities" } ], "code": "UNTRACKED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": true, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/dashboard:e486c45/dashboard", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/dashboard", "summary": "14 vulnerable dependency paths", "targetFile": "Dockerfile", "uniqueCount": 1, "vulnerabilities": [ { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libcrypto3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", ".ruby-rundeps@20240108.230053", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "apk-tools/apk-tools@2.14.0-r2", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "busybox/ssl_client@1.36.1-r5", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "ca-certificates/ca-certificates@20230506-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "nodejs/nodejs@18.18.2-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libssl3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "apk-tools/apk-tools@2.14.0-r2", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "busybox/ssl_client@1.36.1-r5", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "nodejs/nodejs@18.18.2-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:6afffdb", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@e486c45", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" } ] }, "created_at": 1705474719.113236, "has_audit_package": true }
Evidence for 'lint'
{ "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552139704", "commit_sha": "e486c45c252720b668ba642d60d4004151b75a49", "evidence_archive_fingerprint": "30531584dcfd7cda89c91beeb4b3e9d73cc3c3e73a1fe03013d6a7b6021ed683", "user_data": {}, "created_at": 1705474687.3836572, "has_audit_package": true }
Evidence for 'pull-request'
{ "evidence_type": "pull_request", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552139704", "commit_sha": "e486c45c252720b668ba642d60d4004151b75a49", "evidence_url": "https://github.com/cyber-dojo/dashboard/pull/108", "user_data": {}, "git_provider": "github", "pull_requests": [ { "merge_commit": "e486c45c252720b668ba642d60d4004151b75a49", "url": "https://github.com/cyber-dojo/dashboard/pull/108", "state": "closed", "approvers": [] } ], "created_at": 1705474682.5333822, "has_audit_package": false }