|CVE-2021-23214||sourcegraph/server||High||Info||Some vulnerability scanners fingerprint this image as containing PostgreSQL 12.9, while the image actually contains 12.10. This finding is a false positive.|
|CVE-2021-32027||sourcegraph/server||High||Info||Some vulnerability scanners fingerprint this image as containing PostgreSQL 12.7, while the image actually contains 12.10. This finding is a false positive.|
|CVE-2021-33194||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Low||The CVE affects HTML parsers, specifically the |
ParseFragment function. The affected dependencies don’t use the function nor import the library.
|CVE-2021-38561||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Info||The CVE affects application parsing language tag using the affected library. Neither of the Sourcegraph dependencies use |
x/text to parse arbitrary language tags.
|CVE-2021-44716||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Low||In certain conditions, the monitoring functionality packaged with Sourcegraph (Grafana and cAdvisor) could be rendered temporarily inoperable via specially crafted HTTP/2 requests. Exploiting this vulnerability requires administrator-level access, and does not affect the core Sourcegraph functionality. Sourcegraph does not consider this issue a viable security threat to the product.|
|CVE-2022-1552||sourcegraph/server||High||Info||The vulnerability affects Postgres servers with multiple users where one user can bypass authorization controls and execute commands under a superuser identity. Sourcegraph runs Postgres with only the sg user, making the application not affected by this vulnerability.|
|CVE-2022-2625||sourcegraph/server||High||Info||Sourcegraph’s default permissions model means it is not vulnerable to this issue.|
|CVE-2022-21698||sourcegraph/cadvisor, sourcegraph/grafana, sourcegraph/postgres_exporter, sourcegraph/server||High||Low||The vulnerability affects several third party images shipped with Sourcegraph. However, it doesn’t affect Sourcegraph services dirtectly and the third party services are not exposed via HTTP. Sourcegraph is not vulnerable to this vulnerability.|
|CVE-2022-27191||caddy, sourcegraph/grafana, sourcegraph/prometheus, sourcegraph/server, sourcegraph/postgres_exporter, sourcegraph/node-exporter||High||Info||This vulnerability impacts SSH servers using the affected dependency. None of the affected images have ssh servers, much less using the dependency. Sourcegraph is not affected by this issue.|
|CVE-2022-27664||sourcegraph/cadvisor, sourcegraph/prometheus, sourcegraph/grafana, sourcegraph/jaeger-all-in-one, sourcegraph/minio, sourcegraph/indexed-searcher, sourcegraph/server, caddy, sourcegraph/jaeger-agent, sourcegraph/search-indexer, sourcegraph/postgres_exporter, sourcegraph/node-exporter||High||Low||This is a denial of service vulnerability that could affect the availability of Sourcegraph services in specific situations. As Sourcegraph is run as an internal service, our assessment of the severity of this issue is Low.|
|CVE-2022-37315||sourcegraph/frontend, sourcegraph/gitserver, sourcegraph/migrator, sourcegraph/precise-code-intel-worker, sourcegraph/repo-updater, sourcegraph/searcher, sourcegraph/server, sourcegraph/sg, sourcegraph/symbols, sourcegraph/worker||High||Info||This issue does not affect our GraphQL API. Users are only allowed to fully control GraphQL requests through the API console, which properly sanitizes the queries.|
|CVE-2022-40674||sourcegraph/cadvisor, sourcegraph/search-indexer||High||Info||This vulnerability affects a dependency of cAdvisor. cAdvisor itself does not use the vulnerable functionality, and is therefore not affected by the issue. It also affects our search-indexer image but Zoekt does not parse XML thus not being vulnerable to the issue.|
|CVE-2021-43565||sourcegraph/server, sourcegraph/prometheus, sourcegraph/grafana, sourcegraph/postgres_exporter||High||Info||This vulnerability is reported in dependencies included by Sourcegraph. Sourcegraph itself doesn’t use the vulnerable functionality, and is therefore not affected by the issue.|
|CVE-2022-32149||sourcegraph/server, sourcegraph/jaeger-all-in-one, caddy, sourcegraph/indexed-searcher, sourcegraph/cadvisor, sourcegraph/grafana, sourcegraph/minio, sourcegraph/prometheus, sourcegraph/search-indexer, sourcegraph/jaeger-agent, sourcegraph/postgres_exporter, sourcegraph/node-exporter||High||Low||This affects |
x/text and is fixed in our frontend image. The other images this issue is present in, are not affected as there’s no way for an actor to send arbitrary language headers.
|CVE-2022-40303||sourcegraph/symbols, sourcegraph/github-proxy, sourcegraph/postgres_exporter, sourcegraph/repo-updater, sourcegraph/frontend, sourcegraph/jaeger-all-in-one, sourcegraph/server, sourcegraph/syntax-highlighter, sourcegraph/migrator, sourcegraph/searcher, sourcegraph/sg, sourcegraph/precise-code-intel-worker, sourcegraph/worker, sourcegraph/jaeger-agent, sourcegraph/gitserver||High||Info||This issue affects libxml2, which Sourcegraph does not use. It’s a system dependency that is used by CLI tools that are not invoked by the application.|
|CVE-2022-40304||sourcegraph/symbols, sourcegraph/github-proxy, sourcegraph/postgres_exporter, sourcegraph/repo-updater, sourcegraph/frontend, sourcegraph/jaeger-all-in-one, sourcegraph/server, sourcegraph/syntax-highlighter, sourcegraph/migrator, sourcegraph/searcher, sourcegraph/sg, sourcegraph/precise-code-intel-worker, sourcegraph/worker, sourcegraph/jaeger-agent, sourcegraph/gitserver||High||Info||This issue affects libxml2, which Sourcegraph does not use. It’s a system dependency that is used by CLI tools that are not invoked by the application.|
|CVE-2022-3515||sourcegraph/minio||High||Info||The affected package libksba as a dependency of GnuPG for parsing ASN.1 structures. Sourcegraph is not affected by this vulnerability as GnuPG is not invoked with untrusted inputs.|
|CVE-2020-7731||sourcegraph/grafana, sourcegraph/server||High||Low||This is a denial of service vulnerability that can affect Sourcegraph instances where SAML2 is configured as an authProvider. The availability impact of exploitation would be limited.|