-
-
Notifications
You must be signed in to change notification settings - Fork 578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False positives in Trivy analyzer ? #3774
Comments
I inspected HTTP traffic of vulnerability scans between client (both Dependency-Track and Trivy CLI) and Trivy server. I discovered the slight difference of POST data between Dependency-Track and Trivy CLI.
Please see the example below.
|
As for RPM and DEB packages, false positives by Trivy Analyser seems to be resolved by modifying the source code a little. I modified the source code of 4.11.3. Modified files are 2 files, "main/java/org/dependencytrack/tasks/scanners/TrivyAnalysisTask.java" and "main/java/org/dependencytrack/parser/trivy/model/Package.java". For your reference, the patch file ("dependency-track-4.11.3_trivy_rpm+deb.patch") is attached to the last of this message. After deploying the modified apiserver JAR file, I re-analysed the project of rpm packages in "Rocky Linux 9.4" which I mentioned in this issue. The result is "27 vulnerabilities detected" (screenshot is below), as I wanted. Inaddition, I also confirmed the same thing for DEB packages; scan results of deb packages in Ubuntu 22.04 are the same both by Dependency-Track and by Trivy CLI. dependency-track-4.11.3_trivy_rpm+deb.patch Thank you. |
Hey sorry for missing this, I will try to have a look into it today |
@dsk-imgw do you want to create a PR for this or do you want me to handle it? |
If possible, I would appreciate it if you could handle a PR. |
Ok, Im a little busy right now, but I will try to create it the next few days |
@dsk-imgw What's the reason for closing this issue? Does the proposed patch not work as expected? |
I closed the issue as "stale" or "inactive" by the following reasons:
- No response for a certain period of time.
- I thought that leaving issues unresolved for a long time would not be
good.
(- It seems that no other users are experiencing the same problem as me.)
2024年7月9日(火) 1:54 Niklas ***@***.***>:
… @dsk-imgw <https://github.com/dsk-imgw> What's the reason for closing
this issue? Does the proposed patch not work as expected?
—
Reply to this email directly, view it on GitHub
<#3774 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AX7E4DA7QLPPN5ZCYXYAZXDZLK73XAVCNFSM6AAAAABIPCTSLWVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDEMJUGY4DSOBZGM>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
Current Behavior
Trivy analyzer may report false positives (at least about Rocky Linux 9).
Steps to Reproduce
=> The result was … step 2: 77 vulnerabilities (all detected by trivy analyzer), and step 3: 27 vulnerabilties (please see the screenshots below for details).
Results by Dependency Track
Results by trivy CLI
Expected Behavior
I think trivy analyzer in Dependency-Track should detect only 27 vulnerabitiles detected by trivy CLI by the following reasons.
Dependency-Track Version
4.11.1
Dependency-Track Distribution
Container Image
Database Server
PostgreSQL
Database Server Version
10.5
Browser
Google Chrome
Checklist
The text was updated successfully, but these errors were encountered: