We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 155753a commit e3dbbfaCopy full SHA for e3dbbfa
WORKSPACE.yaml
@@ -33,6 +33,15 @@ provenance:
33
slsa: true
34
sbom:
35
enabled: true
36
+ ignoreVulnerabilities:
37
+ - vulnerability: CVE-2022-33171
38
+ reason: |
39
+ This vulnerability in TypeORM's findOne / findOneOrFail functions can improperly interpret a crafted JSON object
40
+ and concatenate it into raw SQL, potentially allowing SQL injection attacks.
41
+
42
+ In Gitpod’s usage, TypeORM is not exposed to arbitrary user input. For example, DB migrations run preset queries;
43
+ the server/bridge code does not hand raw JSON from external sources to findOne. Therefore, there is no path for
44
+ injecting malicious JSON into a query, rendering the vulnerability non-exploitable.
45
environmentManifest:
46
- name: "go"
47
command: ["sh", "-c", "go version | sed s/arm/amd/"]
0 commit comments