Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle Gitlab false positive #1447

Open
2 tasks
pombredanne opened this issue Mar 26, 2024 · 2 comments
Open
2 tasks

Handle Gitlab false positive #1447

pombredanne opened this issue Mar 26, 2024 · 2 comments

Comments

@pombredanne
Copy link
Member

This https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.owasp.antisamy/antisamy/CVE-2023-49093.yml started as an advisory and then became a "False positive"
Gitlab updates the description and title in these cases, and there are 150+ such advisories.

The outcome is invalid data. We should support these and update accordingly

See https://public.vulnerablecode.io/packages/pkg:maven/org.owasp.antisamy/antisamy@1.7.4?search=antisamy

There https://public.vulnerablecode.io/vulnerabilities/VCID-zx5k-4m3n-aaaj does NOT apply to antisamy

Screenshot 2024-03-26 at 12-38-37 VulnerableCode Package Details - pkg maven_org owasp antisamy_antisamy@1 7 4

See attached for a list of patterns found in GitLab advisories
fp.txt

@julianthome gentle ping... do you know if there is a list of patterns we can track? Thanks!

In the same domain, we should also find is there are other related unstructured patterns in GitLab and also:

  • Handle "Disputed" markers in CVEs texts
  • Handle "Awaiting Analysis" in CVEs
@pombredanne
Copy link
Member Author

Some input from today's weekly call:

  • I pointed that we would likely need to keep track of which advisory contributed to create a vulnerability and a package-relationship in all cases to track the changes of advisories from good to bad so we can know which relationship need to be amended
  • @Hritik14 suggested we could may be put git to good use to keep track of the records' version changes, and this would help investigate the issue more efficiently.
  • Using git as in FederatedCode could be a really nice thing to also help with data distribution, and we would also add advisories to get a full picture in all cases.

@Hritik14
Copy link
Collaborator

Adding to above,

In the git based design, the original data sources persist in our storage. The import operations do not overwrite the existing data from the same data source, instead it maintains a diff-based (call it git?) record of all the changes an advisory goes through. This shows a timeline of the advisory as it grows.

The benefits are:

  1. Get to know how many times an advisory has changed and possibly flag such data sources. A change could potentially be a good thing about the data source if it slowly gets reflected over other sources for the same vulnerability over time. It could be a bad thing if only a single data source goes through the change or it goes through the change after every other possible data source has gone through it.
  2. Once the cat (advisory) is out of the box, it persists for eternity on the internet. We should have a record of such advisory even if it means only to mark it as "changed" or "updated". This will help with indexing from a search engine point of view.
  3. Hypothetically, an older revision of the advisory may be more accurate and there might be a need to revert back to this older version. This revert opinion can be driven by the decentralized project (FederatedCode). It gives a say to the users of FederatedCode about a change in an advisory.

The implementation of such a model needs to be discussed in detail after the idea sounds convincing enough.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants