-
Notifications
You must be signed in to change notification settings - Fork 412
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docker Security scan (week 43) #1084
Comments
Hi! Guys, it is not enough to use docker hub security check, as well as trivy and other solutions. I found a so-called protestware in wazuh official docker image:
and then
I am very disappointed and very nervous as security solutions is equipped with such a random code from internet. Also could you give some ideas on this topic? |
The same issue with:
But |
Hi, I was reviewing this and I found the I checked the latest released tag node@osd:~/kbn/plugins/wazuh$ yarn why es5-ext
yarn why v1.22.19
warning Skipping preferred cache folder "/home/node/.cache/yarn" because it is not writable.
warning Selected the next writable cache folder in the list, will be "/tmp/.yarn-cache-1000".
[1/4] Why do we have the module "es5-ext"...?
[2/4] Initialising dependency graph...
[3/4] Finding dependency...
[4/4] Calculating file sizes...
=> Found "[email protected]"
info Reasons this module exists
- "pdfmake#@foliojs-fork#linebreak#brfs#static-module#scope-analyzer#es6-set" depends on it
- Hoisted from "pdfmake#@foliojs-fork#linebreak#brfs#static-module#scope-analyzer#es6-set#es5-ext"
- Hoisted from "pdfmake#@foliojs-fork#linebreak#brfs#static-module#scope-analyzer#es6-map#es5-ext"
- Hoisted from "pdfmake#@foliojs-fork#linebreak#brfs#static-module#scope-analyzer#es6-map#es6-iterator#es5-ext"
- Hoisted from "pdfmake#@foliojs-fork#linebreak#brfs#static-module#scope-analyzer#es6-map#d#es5-ext"
- Hoisted from "pdfmake#@foliojs-fork#linebreak#brfs#static-module#scope-analyzer#es6-set#event-emitter#es5-ext"
info Disk size without dependencies: "2.21MB"
info Disk size with unique dependencies: "2.48MB"
info Disk size with transitive dependencies: "6.38MB"
info Number of shared dependencies: 5
For this plugin version ( For the other hand, I checked the latest |
@Desvelao Hi! Thanks for the assistance! So is it correct to say that |
I checked, and the answer is "yes". Very pity :-( |
Hi @gecube , according to my findings medikoo/es5-ext#197, it seems the message only appears when installing the The related GitHub repository has more issues with the mentioned message if you want to know more about this topic: https://github.com/medikoo/es5-ext/issues?page=1&q=is%3Aissue+is%3Aclosed . As I said in my previous message, from my research the Wazuh dashboard 4.6.0 Docker image seems to contain the post-install script of Thank you very much for letting us know about this. |
@Desvelao Hi! I understand that this message is kinda of dead code that would not run in production. But it is present in target artifact, i.e. docker image, so effectively meaning that there is a way how it could be executed. O.k. I believe that it would be never invoked, but it would be difficult to explain this fact to different security officers, so from my opinion the best option to ask Wazuh team to provide cleaned up version of artifact and improve detection of threat during build process. |
Hi, below results for docker image wazuh/wazuh-dashboard:4.6.0 Cerberus Vulnerability Scan Results (Node.js), node: cerberus-a2446f64-00db-bf58-cdc8-3f72e9d0ae9b
|
docker image wazuh/wazuh-indexer:4.6.0 Cerberus Vulnerability Scan Results, node: cerberus-a2446f64-00db-bf58-cdc8-3f72e9d0ae9b
|
@gecube the protest ware file will probably disappear in Wazuh 4.9.0. This file is a transitive dependency. The component which uses it will be removed. @pyToshka we also user automated scanners on our artifacts. We're aware of the vulnerabilities you reported. I've compiled the relevant information in the same tables you posted. Because we use a fork of opensearch to implement indexer and dashboard, we do not publish those vulnerabilities as or own, instead, we work with opensearch to fix them for the whole community. Of course, there are can be vulnerabilities in our code. Take a look at our SECURITY.md documentation to know how to report them, and how Wazuh will manage them. Dashboard
Indexer
I'll close this issue as there will be no fixes associated with it. To follow the discussion I propose to move this to any of our community channels. |
Description
The vulnerabilities list for Wazuh Docker images must be updated.
The text was updated successfully, but these errors were encountered: