checkov@2.3.242 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the checkov package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Exposure of Sensitive System Information to an Unauthorized Control Sphere

checkov is an Infrastructure as code static analysis

Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere when cloning external modules from private registries. An attacker can obtain sensitive access keys by reviewing the cleartext data present in the output.

How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere?

Upgrade checkov to version 3.2.449 or higher.

[,3.2.449)
  • M
Deserialization of Untrusted Data

checkov is an Infrastructure as code static analysis

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via use of eval. An attacker can execute arbitrary code by submitting a specially crafted Terraform file for analysis. This is only exploitable if the user scans Terraform files from untrusted sources or pull requests.

How to fix Deserialization of Untrusted Data?

Upgrade checkov to version 3.2.415 or higher.

[,3.2.415)