checkov@2.3.210 vulnerabilities

Infrastructure as code static analysis

  • latest version

    3.2.493

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    13 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the checkov package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Exposure of Sensitive System Information to an Unauthorized Control Sphere

    checkov is an Infrastructure as code static analysis

    Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere when cloning external modules from private registries. An attacker can obtain sensitive access keys by reviewing the cleartext data present in the output.

    How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere?

    Upgrade checkov to version 3.2.449 or higher.

    [,3.2.449)
    • M
    Deserialization of Untrusted Data

    checkov is an Infrastructure as code static analysis

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data via use of eval. An attacker can execute arbitrary code by submitting a specially crafted Terraform file for analysis. This is only exploitable if the user scans Terraform files from untrusted sources or pull requests.

    How to fix Deserialization of Untrusted Data?

    Upgrade checkov to version 3.2.415 or higher.

    [,3.2.415)