checkov@3.2.279 vulnerabilities

Infrastructure as code static analysis

  • latest version

    3.2.461

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    5 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the checkov package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Exposure of Sensitive System Information to an Unauthorized Control Sphere

    checkov is an Infrastructure as code static analysis

    Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere when cloning external modules from private registries. An attacker can obtain sensitive access keys by reviewing the cleartext data present in the output.

    How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere?

    Upgrade checkov to version 3.2.449 or higher.

    [,3.2.449)
    • M
    Deserialization of Untrusted Data

    checkov is an Infrastructure as code static analysis

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data via use of eval. An attacker can execute arbitrary code by submitting a specially crafted Terraform file for analysis. This is only exploitable if the user scans Terraform files from untrusted sources or pull requests.

    How to fix Deserialization of Untrusted Data?

    Upgrade checkov to version 3.2.415 or higher.

    [,3.2.415)