Allow users to scan vulnerabilities in the Go binary itself #6521
Closed
oatovar
started this conversation in
False Detection
Replies: 1 comment 2 replies
-
Duplicate of #1837 |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
CVE-2023-4822
Description
The Go documentation has a note that Trivy will intentionally not report vulnerabilities that directly affect the binary.
Unfortunately, this leads to false negatives where you can scan a container that's running a known vulnerable binary, but don't receive the vulnerability in the report. I'm not sure what the historical context was for this from looking at aquasecurity/go-dep-parser#19, but I think detecting vulnerabilities in the project itself is a valid use case.
Reproduction Steps
Run
trivy image --format cyclonedx --output bom.json grafana/grafana:9.5.1-ubuntu
Inspect the generated SBOM and verify that there's not an entry for
github.com/grafana/grafana
as a component.Run a background container with the same image
docker run --rm -d --name grafana grafana/grafana:9.5.1-ubuntu
Copy the binary from the container
Run
go version -m ./grafana
and verify that you can see the vulnerable module name and version (some output omitted for brevity).Target
Container Image
Scanner
Vulnerability
Target OS
No response
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions