-
-
Notifications
You must be signed in to change notification settings - Fork 584
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for CDX vulnerability references #1642
Comments
I lot of users will be very pleased to see this enhancement implemented. I know that my main "customer" (in management) thinks that it is just what he needs to see done in order for him to authorise me to enable GHSA analyser on our production server. A few questions/observations...
|
Support for aliasing for GHSA is working upon mirroring of the data. The next step is to de-dupe and update scoring logic. Aliases are already provided in the REST API. @msymons very good questions, many of which would be individual enhancements. This ticket does not mention alerts, attribution, differences in scoring, or auditing. Any of these would be individual enhancements after the aliasing system is in place and basic functionality is working. As of now, OSS Index is out of scope due to multiple issues with their data. I have tried three different packages:
All three packages result in vulnerabilities where the data is untrustworthy. In some cases, the CVE is in the vulnerability description field, but not in the We will be excluding OSS Index support of aliases until such time their data issues are sorted. |
There's one more wrinkle. As with some of the items above it might need to be catered for by later logging of a separate issue (enhancement) but I am mentioning it here so that at least there is an initial record... Vulnerability Description often seems to be orders of magnitude better in one analyser than another. Compare CVE-2022-2191 (GHSA) with same in OSSI Nearly 300 words in former. Just 34 in later (taken from NVD). When support for CDX vulnerability references is implemented then we want to ensure that "good desciptions" do not get buried. In this example, the work-around provided via GHSA might be the exact piece of information that is critical to some users. |
Closing this issue as basic functionality has been shipped with 4.6. I raised some issues for further improvements and introduced the vuln-aliases label to track them. I'll also throw some of @msymons' suggestions into more issues as well. |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
Current Behavior:
Currently, each vulnerability is unique by its source and identifier. However, different sources have different identifiers for the same vulnerability. This leads to duplicate vulnerabilities, increased risk scores, and extra effort in auditing.
Proposed Behavior:
CycloneDX supports vulnerability references, which are aliases that describe the same vulnerability across multiple sources of vulnerability intelligence. Dependency-Track should adopt this model and be able to:
The text was updated successfully, but these errors were encountered: