DefectDojo / django-DefectDojo

DevSecOps, ASPM, Vulnerability Management. All on one platform.
https://defectdojo.com
BSD 3-Clause "New" or "Revised" License
3.49k stars 1.48k forks source link

Bump nginx from `69f8c2c` to `a45ee5d` #10448

Closed dependabot[bot] closed 1 week ago

dependabot[bot] commented 1 week ago

Bumps nginx from 69f8c2c to a45ee5d.

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 1 week ago

Hi there :wave:, @dryrunsecurity here, below is a summary of our analysis and findings.

DryRun Security Status Findings
Server-Side Request Forgery Analyzer :white_check_mark: 0 findings
Configured Codepaths Analyzer :white_check_mark: 0 findings
IDOR Analyzer :white_check_mark: 0 findings
Sensitive Files Analyzer :white_check_mark: 0 findings
SQL Injection Analyzer :white_check_mark: 0 findings
Authn/Authz Analyzer :white_check_mark: 0 findings
Secrets Analyzer :white_check_mark: 0 findings

[!Note] :green_circle: Risk threshold not exceeded.

Change Summary (click to expand) The following is a summary of changes in this pull request made by me, your security buddy :robot:. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. **Summary:** The code changes in this pull request focus on updating the base Docker images used for the Nginx web server that serves the static files for the DefectDojo application. The key changes are the use of specific SHA256 digests for the Nginx base images, which ensures that the same trusted image is used consistently across deployments, reducing the risk of unintended changes or vulnerabilities being introduced. The rest of the Dockerfile content appears to be well-structured and follows best practices for building a secure and reliable Docker image for the DefectDojo application, including the installation of necessary dependencies, the generation of static files, and the configuration of the Nginx server. Overall, the changes in this pull request do not appear to introduce any significant security concerns and are a positive step towards maintaining the security and consistency of the DefectDojo application's deployment. **Files Changed:** 1. `Dockerfile.nginx-debian`: The base image for the Nginx container has been updated from `nginx:1.27.0-alpine@sha256:69f8c2c72671490607f52122be2af27d4fc09657ff57e42045801aa93d2090f7` to `nginx:1.27.0-alpine@sha256:a45ee5d042aaa9e81e013f97ae40c3dda26fbe98f22b6251acdf28e579560d55`. This change ensures the use of a specific, trusted Nginx base image version, which is a good security practice. 2. `Dockerfile.nginx-alpine`: The base Nginx image has been updated from version 1.27.0-alpine to a specific SHA256 digest (sha256:a45ee5d042aaa9e81e013f97ae40c3dda26fbe98f22b6251acdf28e579560d55). This change also ensures the use of a specific, known-good version of the Nginx server, which is a positive security practice.

Powered by DryRun Security