Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The markdown format is not supported #29

Closed
ulrich opened this issue Aug 4, 2023 · 4 comments
Closed

The markdown format is not supported #29

ulrich opened this issue Aug 4, 2023 · 4 comments
Assignees

Comments

@ulrich
Copy link

ulrich commented Aug 4, 2023

Hello Team,

I am testing with real pleasure the tool but when I tried some commands I figured out that the markdown format output doesn't seem to work on the last version.

Commands:

❯ docker scout cves --exit-code --ignore-base --only-fixed --only-severity critical,high --format sarif --output mega.sarif mega:1.5.0
    ✓ SBOM of image already cached, 282 packages indexed
    ✓ Ignoring packages and vulnerabilities from base image openjdk
    ✗ Detected 5 vulnerable packages with a total of 8 vulnerabilities
    ✓ Report written to mega.sarif
❯ docker scout cves --exit-code --ignore-base --only-fixed --only-severity critical,high --format packages --output mega.packages mega:1.5.0
    ✓ SBOM of image already cached, 282 packages indexed
    ✓ Ignoring packages and vulnerabilities from base image openjdk
    ✗ Detected 5 vulnerable packages with a total of 8 vulnerabilities
    ✓ Report written to mega.packages
❯ docker scout cves --exit-code --ignore-base --only-fixed --only-severity critical,high --format markdown --output mega.markdown mega:1.5.0

...
Learn More
  Read docker scout cli reference at https://docs.docker.com/engine/reference/commandline/scout/
ERROR   Status: please provide a valid format, Code: 1

Test version:

❯ docker scout version
version: 0.22.2 (go1.20.6 - linux/amd64)
git commit: 7e5413c2e22976e2de12c9889d2f7aa884c7fc7c

Maybe I missed something?

Ulrich

@cdupuis cdupuis assigned cdupuis and eunomie and unassigned cdupuis Aug 4, 2023
@eunomie
Copy link
Member

eunomie commented Aug 4, 2023

Hi @ulrich , hope you're doing well and happy to see you there 👋

Let me check what's going wrong here and I'll come back to you.

@eunomie eunomie closed this as completed Aug 4, 2023
@eunomie eunomie reopened this Aug 4, 2023
@eunomie
Copy link
Member

eunomie commented Aug 4, 2023

@ulrich: here is the v0.22.3 that should solve your issue: https://github.com/docker/scout-cli/releases/tag/v0.22.3

Just to note that the markdown output has been made with GH PR comments in mind, so the markdown contains a lot of html tags (collapsible content and more control over the tables).

See the example in the following comment.

Happy to take any feedback on it :-)

@eunomie
Copy link
Member

eunomie commented Aug 4, 2023

🔍 Vulnerabilities of ***/***:***

📦 Image Reference ***/***:***
digestsha256:13e688445ffc2ff7f5d1d6bc48f2d2a1bfead36131fbe609d7cb54c6b76aace8
vulnerabilitiescritical: 0 high: 1 medium: 3 low: 0 unspecified: 1
platformlinux/arm64
size27 MB
packages294
critical: 0 high: 1 medium: 2 low: 0 unspecified: 1libssl3 3.1.0-r4 (apk)

pkg:apk/alpine/libssl3@3.1.0-r4?arch=aarch64&upstream=openssl&distro=alpine-3.18.0

# Dockerfile (1:1)
FROM alpine:3.18

high : CVE--2023--2650

Affected range<3.1.1-r0
Fixed version3.1.1-r0
Description

medium : CVE--2023--3446

Affected range<3.1.1-r3
Fixed version3.1.1-r3
Description

medium : CVE--2023--2975

Affected range<3.1.1-r2
Fixed version3.1.1-r2
Description

unspecified : CVE--2023--3817

Affected range<3.1.2-r0
Fixed version3.1.2-r0
Description
critical: 0 high: 0 medium: 1 low: 0 semver 7.5.0 (npm)

pkg:npm/semver@7.5.0

# Dockerfile (3:3)
RUN apk add --no-cache npm

medium 5.3: CVE--2022--25883 Inefficient Regular Expression Complexity

Affected range>=7.0.0
<7.5.2
Fixed version7.5.2
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.

@ulrich
Copy link
Author

ulrich commented Aug 4, 2023

Nice job, it works as expected!

I continue the tests of Scout 👍

Have a good day Yves.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants