Attention : support for WAPT 1.8.2 ended on June the 30th 2022.

There are known vulnerabilities in WAPT dependencies in WAPT 1.8.2 branch. Please upgrade to the latest supported version. CVE listing (non exhaustive) :
  • * python engine : python 2.7 (CVE-2020-10735, CVE-2015-20107, CVE-2022-0391, CVE-2021-23336, CVE-2021-3177, CVE-2020-27619, CVE-2020-26116, CVE-2019-20907, CVE-2020-8492, etc.)
  • * cryptography : openssl : CVE-2022-2068, CVE-2022-1292, CVE-2022-0778, CVE-2021-4160, CVE-2021-3712, CVE-2021-23841, CVE-2021-23840, CVE-2021-23839, CVE-2020-1971, CVE-2020-1968, CVE-2019-1551
  • * python dependencies : cryptography (CVE-2020-36242, CVE-2020-25659), eventlet (CVE-2021-21419), jinja2 (CVE-2020-28493), psutil (CVE-2019-18874), waitress (CVE-2022-31015), lxml (CVE-2021-4381, CVE-2021-28957, CVE-2020-27783, CVE-2018-19787), ujson (CVE-2022-31117, CVE-2022-31116, CVE-2021-45958), python-ldap (CVE-2021-46823)

Common mistakes

Using a network drive to store and deliver WAPT packages

The standard way WAPT works is with a secure web server delivering WAPT packages to the WAPT Clients.

Tranquil IT advises against using a network drive for delivering WAPT packages for several reasons:

  • a web server is extremely easy to setup, secure, maintain, backup and monitor;

  • to work correctly, a WAPT package needs to be self-contained. Indeed, we do not know if the network will be available at the time of the installation launch (for example if we have a waptexit that starts when the workstation is shutting down on a network with 802.1x user authentication, there will no longer be a network available at the time of installation). The self-contained nature of WAPT makes it more deterministic than other deployment solutions;

  • network congestion may result from downloading large packages on large fleets of devices because you have less control over bandwidth rates or you may not be able to finish a partial download;

  • this method breaks or at least weakens the security framework of WAPT;

  • this method does not allow you to expose your repositories to internet for your traveling personnel;

Attention

Even though WAPT can work independently of the transport mode, Tranquil IT will not officially support using a network drive to store and deliver WAPT packages.

Using the register() function in your audit scripts

The register() function forces the sending to the WAPT server of the WAPT agent’s hardware and software inventory.

This function is very taxing on the server’s performance because it forces the server to parse a relatively large JSON BLOB and to inject the result into the PostgreSQL database.

The function is by default triggered manually or when a new package upgrade is applied.

When you use the register() function in an audit script, it will run every time the audit script is triggered and load the server with no apparent benefit.

Therefore, we do not recommend the use of the register() function in audit scripts.