Very-long HTML-like output while scanning an image #6980
-
DescriptionDesired BehaviorIt should print out vulns? Actual BehaviorIt prints HTML-like 5k+ lines. Reproduction Steps1. `trivy image docker.io/mattermost/mattermost-enterprise-edition:9.7.1`
2. See the very long output
3.
... TargetContainer Image ScannerVulnerability Output FormatNone ModeStandalone Debug Output2024/06/20 23:25:53 INFO Loaded file_path=trivy.yaml
2024-06-20T23:25:53+03:00 DEBUG Parsed severities severities=[UNKNOWN LOW MEDIUM HIGH CRITICAL]
2024-06-20T23:25:53+03:00 DEBUG Ignore statuses statuses=[]
2024-06-20T23:25:53+03:00 DEBUG Cache dir dir="/Users/furkan.turkal/Library/Caches/trivy"
2024-06-20T23:25:53+03:00 DEBUG DB update was skipped because the local DB is the latest
2024-06-20T23:25:53+03:00 DEBUG DB info schema=2 updated_at=2024-06-20T18:13:18.595104548Z next_update=2024-06-21T00:13:18.595104298Z downloaded_at=2024-06-20T20:24:00.479382Z
2024-06-20T23:25:53+03:00 INFO Vulnerability scanning is enabled
2024-06-20T23:25:53+03:00 DEBUG Vulnerability type type=[os library]
2024-06-20T23:25:53+03:00 INFO Secret scanning is enabled
2024-06-20T23:25:53+03:00 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-20T23:25:53+03:00 INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-20T23:25:53+03:00 DEBUG Enabling misconfiguration scanners scanners=[azure-arm cloudformation dockerfile helm kubernetes terraform terraformplan-json terraformplan-snapshot]
2024-06-20T23:25:54+03:00 DEBUG [secret] No secret config detected config_path="trivy-secret.yaml"
2024-06-20T23:25:54+03:00 DEBUG [nuget] The nuget packages directory couldn't be found. License search disabled
2024-06-20T23:25:54+03:00 DEBUG [secret] No secret config detected config_path="trivy-secret.yaml"
2024-06-20T23:25:55+03:00 DEBUG [image] Detected image ID image_id="sha256:80ff40282191265fdc14fc4d3e36b10c508bce874a2f56cdcc46ff9461ca03ef"
2024-06-20T23:25:55+03:00 DEBUG [image] Detected diff ID diff_ids=[sha256:b93c1bd012ab8fda60f5b4f5906bf244586e0e3292d84571d3abb56472248466 sha256:9a955a56120548732e11aa384bbe021733322be64a8e64d4fe96b60fce9da28a sha256:6c0d78cbfd9ab92cad61594f67f456068c88cb491f47b0d5e944b8cb90b3a2ca sha256:01a82a33ed9b1c91912c173b6e73f673881a32da65533acea7c778ed91e65d67 sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef]
2024-06-20T23:25:55+03:00 DEBUG [image] Detected base layers diff_ids=[sha256:b93c1bd012ab8fda60f5b4f5906bf244586e0e3292d84571d3abb56472248466]
2024-06-20T23:25:56+03:00 INFO Detected OS family="ubuntu" version="22.04"
2024-06-20T23:25:56+03:00 INFO [ubuntu] Detecting vulnerabilities... os_version="22.04" pkg_num=168
2024-06-20T23:25:56+03:00 INFO Number of language-specific files num=2
2024-06-20T23:25:56+03:00 INFO [gobinary] Detecting vulnerabilities...
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Scanning packages for vulnerabilities file_path="mattermost/bin/mattermost"
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Skipping vulnerability scan as no version is detected for the package name="github.com/mattermost/mattermost/server/v8"
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Skipping vulnerability scan as no version is detected for the package name="github.com/mattermost/enterprise"
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Skipping vulnerability scan as no version is detected for the package name="github.com/mattermost/mattermost/server/public"
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Scanning packages for vulnerabilities file_path="mattermost/bin/mmctl"
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Skipping vulnerability scan as no version is detected for the package name="github.com/mattermost/mattermost/server/v8"
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Skipping vulnerability scan as no version is detected for the package name="github.com/mattermost/enterprise"
2024-06-20T23:25:56+03:00 DEBUG [gobinary] Skipping vulnerability scan as no version is detected for the package name="github.com/mattermost/mattermost/server/public"
2024-06-20T23:25:56+03:00 DEBUG Secret file path="/mattermost/client/8055.c2e8394446fd4bca58d8.js"
2024-06-20T23:25:56+03:00 DEBUG Secret file path="/mattermost/client/8055.c2e8394446fd4bca58d8.js.map" Operating SystemmacOS Version2024/06/20 23:28:08 INFO Loaded file_path=trivy.yaml
Version: 0.52.1
Vulnerability DB:
Version: 2
UpdatedAt: 2024-06-20 18:13:18.595104548 +0000 UTC
NextUpdate: 2024-06-21 00:13:18.595104298 +0000 UTC
DownloadedAt: 2024-06-20 20:24:00.479382 +0000 UTC Checklist
|
Beta Was this translation helpful? Give feedback.
Answered by
DmitriyLewen
Jun 21, 2024
Replies: 2 comments 12 replies
-
Hello @Dentrax This image contains 169 vulnerabilities: ➜ trivy -q image docker.io/mattermost/mattermost-enterprise-edition:9.7.1 -f json | grep VulnerabilityID | wc -l
169 That is why html file is large.
Right. The Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
11 replies
-
Track #6999 |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
@itaysk you was right.
I was able to reproduce this case and found problem:
/mattermost/client/8055.c2e8394446fd4bca58d8.js
file contains stripe-publishable-token