Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Support For Outdated Dependency Version Identification #126

Closed
stevespringett opened this issue Apr 8, 2018 · 5 comments
Closed

Add Support For Outdated Dependency Version Identification #126

stevespringett opened this issue Apr 8, 2018 · 5 comments
Assignees
Labels
Milestone

Comments

@stevespringett
Copy link
Member

This enhancement may supercede or replace #46, and may provide some visibility into #8.

Just like projects and components have findings for identified vulnerabilities, this enhancement will add support for detecting older versions of dependencies and apply a risk rating to that as well.

Add support for popular ecosystems that use a package manager and which can be accessed via a REST API without having to support the native tool.

Java / Maven Central

Ruby / RubyGems

Node.js / NPM

PHP Composer

The detection of outdated versions should occur similar to that of vulnerability detection. Upon the initial creation of a new component, perform a check. Then, every 24 hours perform a recheck for each component based on the ecosystem it belongs / use purl for identification.

@stevespringett stevespringett added the enhancement New feature or request label Apr 8, 2018
@stevespringett stevespringett added this to the 3.2 milestone Apr 8, 2018
@stevespringett stevespringett self-assigned this Apr 8, 2018
stevespringett added a commit that referenced this issue May 9, 2018
@stevespringett
Copy link
Member Author

Question for the community: Dependency-Track v3.1 (or 3.2) will have the ability to identify out-of-date components using Maven Central, NPM, and RubyGems as sources of truth. The idea is to highlight potential risk of using out-of-date components with the assignment of a risk score.

Currently Inherited Risk Score (IRS) is calculated by:
((critical * 10) + (high * 5) + (medium * 3) + (low * 1))

Where the number of critical, high, medium, and low severity vulnerabilities are weighted.

What is the ideal algorithm for calculating a risk score for out-of-date components? Should they be part of IRS? Should the risk metrics be separate? What type of visualization would you like to see for this data? Please share your thoughts.

@stevespringett stevespringett added help wanted Extra attention is needed community feedback request and removed help wanted Extra attention is needed labels May 9, 2018
stevespringett added a commit that referenced this issue May 10, 2018
…ility of supporting different types of respositories and multiple versions of the same repo. Repos are now stored in database - defaults are stored for new databases. Analysis is performed whenever a new component is added and every 24 hours thereafter. #126
@stevespringett
Copy link
Member Author

At this point, ruby, npm, and maven resolution all work as designed. The latest version of components are being documented based on the ecosystem, component group and name.

UI metaphors do not yet exist, nor do metrics for calculating risk.

@eoftedal
Copy link
Contributor

I would like to see it separate or policy based
(Policy: specify a weight)

stevespringett added a commit that referenced this issue May 18, 2018
…dpoint to resolve latest version of a component in a configured repo. #126
stevespringett added a commit that referenced this issue May 19, 2018
…e fields. Added UI metaphore to show outdated components and the recent vesion as well as confirmation that a component is up-to-date. #126
@stevespringett stevespringett modified the milestones: 3.2, 3.1 May 19, 2018
@stevespringett
Copy link
Member Author

The UI (and REST resources) now provide easy ways to determine if a component is up-to-date or not. This feature requires accurate PackageURLs for components needing to be tracked. Closing. Add support for configurable policies in a future release. #83

@lock
Copy link

lock bot commented Sep 27, 2018

This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs.

@lock lock bot locked as resolved and limited conversation to collaborators Sep 27, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

2 participants