|CVE-2022-1552||sourcegraph/server||High||Info||The vulnerability affects Postgres servers with multiple users where one user can bypass authorization controls and execute commands under a superuser identity. Sourcegraph runs Postgres with only the sg user, making the application not affected by this vulnerability.|
|CVE-2022-27191||caddy, sourcegraph/grafana, sourcegraph/prometheus, sourcegraph/server||High||Info||This vulnerability impacts SSH servers using the affected dependency. None of the affected images have ssh servers, much less using the dependency. Sourcegraph is not affected by this issue.|
|CVE-2021-33194||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Low||The CVE affects HTML parsers, specifically the |
ParseFragment function. The affected dependencies don’t use the function nor import the library.
|CVE-2021-44716||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Low||In certain conditions, the monitoring functionality packaged with Sourcegraph (Grafana and cAdvisor) could be rendered temporarily inoperable via specially crafted HTTP/2 requests. Exploiting this vulnerability requires administrator-level access, and does not affect the core Sourcegraph functionality. Sourcegraph does not consider this issue a viable security threat to the product.|
|CVE-2022-21698||sourcegraph/cadvisor, sourcegraph/grafana, sourcegraph/postgres_exporter, sourcegraph/server||High||Low||The vulnerability affects several third party images shipped with Sourcegraph. However, it doesn’t affect Sourcegraph services dirtectly and the third party services are not exposed via HTTP. Sourcegraph is not vulnerable to this vulnerability.|
|CVE-2021-38561||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Info||The CVE affects application parsing language tag using the affected library. Neither of the Sourcegraph dependencies use |
x/text to parse arbitrary language tags.
|CVE-2022-37315||sourcegraph/frontend, sourcegraph/gitserver, sourcegraph/migrator, sourcegraph/precise-code-intel-worker, sourcegraph/repo-updater, sourcegraph/server||High||Low||Sourcegraph does not construct GraphQL queries in a manner that exposes it to this vulnerability.|
|CVE-2022-2526||sourcegraph/minio||High||Info||This vulnerability affects a package bundled in the base image of one of Sourcegraph’s containers. Sourcegraph does not use the affected package.|
|CVE-2022-2625||sourcegraph/server||High||Info||Sourcegraph’s default permissions model means it is not vulnerable to this issue.|
|CVE-2022-37315||sourcegraph/frontend, sourcegraph/gitserver, sourcegraph/migrator, sourcegraph/precise-code-intel-worker, sourcegraph/repo-updater, sourcegraph/searcher, sourcegraph/server, sourcegraph/sg, sourcegraph/symbols, sourcegraph/worker||High||Info||This issue does not affect our GraphQL API. Users are only allowed to fully control GraphQL requests through the API console, which properly sanitizes the queries.|