-
-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False Positive on any artifact with an ID or group ID that contains the name of a vulnerable library #2995
Comments
Not sure if this is the same issue but we also noticed recent builds crashing (on Dec1 things were building, on Dec2 things started crashing) due to old CVEs, including GRPC libraries with CVEs from 2017
|
@theHilikus That first filename containing grpc indicates it's the same issue. |
@jeremylong are you seeing this as an issue or expected behaviour? |
@stevehipwell this is expected behavior. See How dependency-check works. I've cleaned up the ones I could - a better solution for grpc is likely needed. |
@jeremylong I've read how this works but I'm unsure as to if the expected behaviour is for a lib whos name contains another lib name to be identified as this often unrelated lib. For example unless a postgres driver has a version over 9.x it's constantly flagged as vulnerable against postgres. The most common ones are things like grpc, json, xml, etc. |
expected behavior - use suppression rules. |
@jeremylong What is a good way to write a suppression rule that ignores the warnings related to grpc version, but still will warn about any new OWASP positives for the given package/dependency? My current attempt after reading the docs/wiki, but really unsure if it works as intended:
|
Looking at the suppressions, I see that we simply need:
note for BTW this pattern (negative regex) has been used some times already ( here , here , here etc. etc.) I created #7250 & #7251 for reference, though I see the CI bot chokes on FP reports created with regexes :} |
Looks like something has happened to the library pattern matching recently.
Example:
False positive CVE-2005-2311 on one of our internal library dependencies - reported as
cpe:2.3:a:sms:sms:0.1.0:snapshot:*:*:*:*:*:*
Same thing with another internal library named ha-scheduled-message-grpc, which was reported to contain an old vulnerability in GRPC library from 2017.
The text was updated successfully, but these errors were encountered: