Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE feed ingestion #4

Closed
RaitoBezarius opened this issue Nov 5, 2023 · 9 comments
Closed

CVE feed ingestion #4

RaitoBezarius opened this issue Nov 5, 2023 · 9 comments
Assignees

Comments

@RaitoBezarius
Copy link
Collaborator

I should be able to seed the app with a tarball of CVE feeds via a management command and then the webapp should be able to download the rest of the history by itself and keep itself synchronized.

As an administrator, I would like to know since when the CVE feed has been fetched for diagnostics purpose and this information should be publicly shown in the web application to security team.

@raboof
Copy link
Contributor

raboof commented Nov 12, 2023

Focusing on CVEs seems like a good first step. You probably want to get them from the NVD feed, since NVD associates them with CPEs for matching against software packages.

Further down the line, we might also want to ingest OSV and GHSA feeds: instead of using CPEs, those associate ecosystem names (like this advisory applies to the package called 'pyarrow' in PyPI, etc).

A useful tool to fetch those might be vulnz (https://github.com/jeremylong/Open-Vulnerability-Project/tree/main/vulnz): that project has incremental updates in scope (though it might not be implemented yet - if not we might want to contribute it).

@RaitoBezarius
Copy link
Collaborator Author

RaitoBezarius commented Nov 12, 2023

Is there any reason to not pursue the official dump of CVE from the automation group as shown here: https://github.com/CVEProject/cvelistV5/blob/main/cves/2023/34xxx/CVE-2023-34000.json which has daily releases + deltas releases every hour?

@RaitoBezarius
Copy link
Collaborator Author

(Of course, when we will be able to, we can enrich the metadata with OSV/GHSA/etc.)

@raboof
Copy link
Contributor

raboof commented Nov 13, 2023

Is there any reason to not pursue the official dump of CVE from the automation group as shown here: https://github.com/CVEProject/cvelistV5/blob/main/cves/2023/34xxx/CVE-2023-34000.json which has daily releases + deltas releases every hour?

Let's test the theory, but I suspect that the 'raw' CVE feed will have relatively little machine-readable package identification metadata. While optimizing for minimizing the time between a CVE being published and it showing up in our trackers is useful, I think the NVD feed should not be that far behind and provide CPEs which are useful for matching..

@raboof
Copy link
Contributor

raboof commented Nov 14, 2023

@ApolloUnicorn
Copy link

ApolloUnicorn commented Nov 15, 2023

@raboof
Copy link
Contributor

raboof commented Nov 16, 2023

While optimizing for minimizing the time between a CVE being published and it showing up in our trackers is useful, I think the NVD feed should not be that far behind

Anecdotally: a CVE I pushed to Mitre this morning is already in the NVD feed, so the lag was at least less than 4 hours in this case.

@Tom-Hubrecht
Copy link
Contributor

So, on https://github.com/Nix-Security-WG/nix-security-tracker/tree/tracker-dev we now have bulk cve ingestion for starting the tracker database as well as ingestion of delta diffs published by mitre ont the cvelistV5 repo.
Those delta are taken everyday, I don't know if we need more precision than this

@fricklerhandwerk
Copy link
Collaborator

Closed by #68

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

No branches or pull requests

6 participants