Skip to content

Commit

Permalink
Update master (#226)
Browse files Browse the repository at this point in the history
* Clarify bounty targets in insights (#219)

Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>

* Update vdb to get dotnet case fixes (#222)

* Update vdb to get dotnet case fixes

Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>

* Fix test for cvss 3

Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>

---------

Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>

---------

Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>
  • Loading branch information
prabhu committed Jan 26, 2024
1 parent 235a8ef commit 9c1a96a
Show file tree
Hide file tree
Showing 4 changed files with 12 additions and 6 deletions.
10 changes: 6 additions & 4 deletions depscan/lib/analysis.py
Original file line number Diff line number Diff line change
Expand Up @@ -539,9 +539,9 @@ def prepare_vdr(options: PrepareVdrOptions):
if clinks.get("poc") or clinks.get("Bug Bounty"):
if reached_purls.get(purl):
insights.append(
"[bright_red]:exclamation_mark: Reachable and Exploitable[/bright_red]"
"[yellow]:notebook_with_decorative_cover: Reachable Bounty target[/yellow]"
)
plain_insights.append("Reachable and Exploitable")
plain_insights.append("Reachable Bounty target")
has_reachable_poc_count += 1
has_reachable_exploit_count += 1
pkg_requires_attn = True
Expand All @@ -560,8 +560,10 @@ def prepare_vdr(options: PrepareVdrOptions):
pkg_requires_attn = True
if clinks.get("vendor") and package_type not in config.OS_PKG_TYPES:
if reached_purls.get(purl):
insights.append(":receipt: Reachable")
plain_insights.append("Reachable")
# If it has a poc, an insight might have gotten added above
if not pkg_requires_attn:
insights.append(":receipt: Reachable")
plain_insights.append("Reachable")
else:
insights.append(":receipt: Vendor Confirmed")
plain_insights.append("Vendor Confirmed")
Expand Down
1 change: 1 addition & 0 deletions depscan/lib/config.py
Original file line number Diff line number Diff line change
Expand Up @@ -151,6 +151,7 @@ def resource_path(relative_path):
"json-smart": "json-smart-v2",
"ojdbc7": "jdbc",
"System.Text": ".net",
"System.Net": "asp.net_core",
"Microsoft.IdentityModel.Clients.ActiveDirectory": "active_directory_authentication_library",
"starkbank_ecdsa": "ecdsa-elixir",
"php-pear": "pear-core-minimal",
Expand Down
4 changes: 2 additions & 2 deletions pyproject.toml
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
[project]
name = "owasp-depscan"
version = "5.2.1"
version = "5.2.2"
description = "Fully open-source security audit for project dependencies based on known vulnerabilities and advisories."
authors = [
{name = "Team AppThreat", email = "cloud@appthreat.com"},
]
dependencies = [
"appthreat-vulnerability-db>=5.5.8",
"appthreat-vulnerability-db>=5.5.10",
"defusedxml",
"oras",
"PyYAML",
Expand Down
3 changes: 3 additions & 0 deletions test/test_csaf.py
Original file line number Diff line number Diff line change
Expand Up @@ -446,6 +446,7 @@ def test_parse_cvss():
'modifiedConfidentialityImpact': 'HIGH',
'modifiedIntegrityImpact': 'HIGH',
'modifiedPrivilegesRequired': 'NONE',
'modifiedScope': 'UNCHANGED',
'modifiedUserInteraction': 'NONE',
'privilegesRequired': 'NONE',
'scope': 'UNCHANGED',
Expand Down Expand Up @@ -924,6 +925,7 @@ def test_add_vulnerabilities():
'modifiedConfidentialityImpact': 'HIGH',
'modifiedIntegrityImpact': 'HIGH',
'modifiedPrivilegesRequired': 'NONE',
'modifiedScope': 'UNCHANGED',
'modifiedUserInteraction': 'REQUIRED',
'privilegesRequired': 'NONE',
'scope': 'UNCHANGED',
Expand Down Expand Up @@ -1017,6 +1019,7 @@ def test_add_vulnerabilities():
'modifiedConfidentialityImpact': 'HIGH',
'modifiedIntegrityImpact': 'HIGH',
'modifiedPrivilegesRequired': 'NONE',
'modifiedScope': 'UNCHANGED',
'modifiedUserInteraction': 'NONE',
'privilegesRequired': 'NONE',
'scope': 'UNCHANGED',
Expand Down

0 comments on commit 9c1a96a

Please sign in to comment.