dradis-veracode 4.14.0 → 4.16.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 377e92adc3f11ee6e82f78c510986e3b39321d26810ae37f88630aa86f799684
4
- data.tar.gz: 73d9d5ecac85b5b97b75525f6fc7f4e182e0f7742f917bd56444daecd0087284
3
+ metadata.gz: 6f041e0a2687a67c6bf0dbbd427a1e4b9c8ab8997f0630ee36c9d388f081b772
4
+ data.tar.gz: c7f4f7096c0d207be9a73a600dd0e7323661cd27bfe6f7d50cfe2ce207128539
5
5
  SHA512:
6
- metadata.gz: 8a4e88b7881297ffddecfb2c9e349e1e88cdfa5a84b4fd755bab1ccdc9a03c2569e513aaae874fd27324f33afb711255ab483cea456d94f3117e9a333ac0848b
7
- data.tar.gz: 4007fbf71e3e6d5586947f51e54088712c1776af832b3ab4ab49d8612733355bbc0400767f3917fde38e2d8f363237e870eb5637a6b1c343b0d1a68396aa9574
6
+ metadata.gz: d5a4e6b6d59f4c13d253e6a3445ece2aab1eccda0251b761a2fd848f1ba033b7c242e07c03267d317e70093050649a0e4a64016bb77101e4e99d4ebf26dd9a76
7
+ data.tar.gz: 4605c3881c89a79ec5364f3532b016d30cba27ca6546d84a4cfa33d37bb553335d84c79982cfccc87c631f0e71e2a1e4722f302cd5b73d30c346f6885289d344
data/CHANGELOG.md CHANGED
@@ -1,3 +1,9 @@
1
+ v4.16.0 (May 2025)
2
+ - No changes
3
+
4
+ v4.15.0 (December 2024)
5
+ - No changes
6
+
1
7
  v4.14.0 (October 2024)
2
8
  - Import data from the software composition analysis section
3
9
 
@@ -8,7 +8,7 @@ module Dradis
8
8
 
9
9
  module VERSION
10
10
  MAJOR = 4
11
- MINOR = 14
11
+ MINOR = 16
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
@@ -35,7 +35,7 @@ describe Dradis::Plugins::Veracode::Importer do
35
35
  end
36
36
 
37
37
  it 'creates nodes, issues, and, evidence' do
38
- expect(@content_service).to receive(:create_node).with(hash_including label: 'Cybersecurity-Pilot').once
38
+ expect(@content_service).to receive(:create_node).with(hash_including label: 'Example-App').once
39
39
 
40
40
  %w{ 117 382 CVE-2022-41404 CVE-2022-36033 SRCCLR-SID-22742 CVE-2022-42889 }.each do |cweid|
41
41
  expect(@content_service).to receive(:create_issue).with(hash_including id: cweid).at_least(:once)
@@ -44,6 +44,6 @@ describe Dradis::Plugins::Veracode::Importer do
44
44
  expect(@content_service).to receive(:create_evidence).with(hash_including(content: '')).at_least(7).times
45
45
 
46
46
  # Run the import
47
- @importer.import(file: 'spec/fixtures/files/veracode.xml')
47
+ @importer.import(file: 'spec/fixtures/files/veracode-scrubbed.xml')
48
48
  end
49
49
  end
@@ -1,6 +1,6 @@
1
1
  <?xml version="1.0" encoding="UTF-8"?>
2
2
 
3
- <detailedreport xmlns:xsi="http&#x3a;&#x2f;&#x2f;www.w3.org&#x2f;2001&#x2f;XMLSchema-instance" xmlns="https&#x3a;&#x2f;&#x2f;www.veracode.com&#x2f;schema&#x2f;reports&#x2f;export&#x2f;1.0" xsi:schemaLocation="https&#x3a;&#x2f;&#x2f;www.veracode.com&#x2f;schema&#x2f;reports&#x2f;export&#x2f;1.0 https&#x3a;&#x2f;&#x2f;analysiscenter.veracode.com&#x2f;resource&#x2f;detailedreport.xsd" report_format_version="1.5" account_id="10470" app_name="Cybersecurity-Pilot" app_id="1280614" analysis_id="22666593" static_analysis_unit_id="22682243" sandbox_id="4031820" first_build_submitted_date="2022-12-12 06&#x3a;18&#x3a;41 UTC" version="12 Dec 2022 Static Promoted" build_id="22695302" submitter="Sai Manjunath Reddy Katha" platform="Not Specified" assurance_level="2" business_criticality="2" generation_date="2023-03-07 14&#x3a;45&#x3a;59 UTC" veracode_level="VL3 &#x2b; SCA" total_flaws="3" flaws_not_mitigated="3" teams="SecurityReviewServices" life_cycle_stage="Not Specified" planned_deployment_date="2022-12-12 07&#x3a;40&#x3a;09 UTC" last_update_time="2022-12-12 08&#x3a;20&#x3a;14 UTC" is_latest_build="true" policy_name="HP Internet App" policy_version="13" policy_compliance_status="Pass" policy_rules_status="Pass" grace_period_expired="false" scan_overdue="false" business_owner="Hoelzer, Ralf" business_unit="Cybersecurity" tags="sammuel.washington&#x40;hp.com" legacy_scan_engine="false"><static-analysis rating="A" score="99" submitted_date="2022-12-12 08&#x3a;19&#x3a;44 UTC" published_date="2022-12-12 08&#x3a;20&#x3a;13 UTC" version="12 Dec 2022 Static Promoted" analysis_size_bytes="105400" engine_version="20221110172554">
3
+ <detailedreport xmlns:xsi="http&#x3a;&#x2f;&#x2f;www.w3.org&#x2f;2001&#x2f;XMLSchema-instance" xmlns="https&#x3a;&#x2f;&#x2f;www.veracode.com&#x2f;schema&#x2f;reports&#x2f;export&#x2f;1.0" xsi:schemaLocation="https&#x3a;&#x2f;&#x2f;www.veracode.com&#x2f;schema&#x2f;reports&#x2f;export&#x2f;1.0 https&#x3a;&#x2f;&#x2f;analysiscenter.veracode.com&#x2f;resource&#x2f;detailedreport.xsd" report_format_version="1.5" account_id="10470" app_name="Example-App" app_id="12345" analysis_id="22666593" static_analysis_unit_id="22682243" sandbox_id="4031820" first_build_submitted_date="2022-12-12 06&#x3a;18&#x3a;41 UTC" version="12 Dec 2022 Static Promoted" build_id="22695302" submitter="Submitter" platform="Not Specified" assurance_level="2" business_criticality="2" generation_date="2023-03-07 14&#x3a;45&#x3a;59 UTC" veracode_level="VL3 &#x2b; SCA" total_flaws="3" flaws_not_mitigated="3" teams="SecurityReviewServices" life_cycle_stage="Not Specified" planned_deployment_date="2022-12-12 07&#x3a;40&#x3a;09 UTC" last_update_time="2022-12-12 08&#x3a;20&#x3a;14 UTC" is_latest_build="true" policy_name="Example Internet App" policy_version="13" policy_compliance_status="Pass" policy_rules_status="Pass" grace_period_expired="false" scan_overdue="false" business_owner="Business Owner" business_unit="Cybersecurity" tags="example&#x40;test.com" legacy_scan_engine="false"><static-analysis rating="A" score="99" submitted_date="2022-12-12 08&#x3a;19&#x3a;44 UTC" published_date="2022-12-12 08&#x3a;20&#x3a;13 UTC" version="12 Dec 2022 Static Promoted" analysis_size_bytes="105400" engine_version="20221110172554">
4
4
  <modules>
5
5
  <module name="pipeline-scan.jar" compiler="JAVAC_8" os="Java J2SE 8" architecture="JVM" loc="6130" score="99" numflawssev0="0" numflawssev1="0" numflawssev2="1" numflawssev3="2" numflawssev4="0" numflawssev5="0"/>
6
6
  </modules>
@@ -110,9 +110,9 @@
110
110
  <vulnerabilities>
111
111
  <vulnerability cve_id="CVE-2022-41404" cvss_score="5.0" severity="3" cwe_id="" first_found_date="2022-12-12 08&#x3a;19&#x3a;48 UTC" cve_summary="org.ini4j&#x3a;ini4j is vulnerable to denial of service &#x28;DoS&#x29; attacks. The vulnerable &#x60;fetch&#x60; method in the &#x60;BasicProfile.java&#x60; allows remote attackers to cause denial of service conditions in the target system." severity_desc="Medium" mitigation="true" mitigation_type="Potential False Positive" mitigated_date="2023-01-05 16&#x3a;15&#x3a;07 UTC" vulnerability_affects_policy_compliance="false">
112
112
  <mitigations>
113
- <mitigation action="Potential False Positive" description="testing" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2023-01-05 16&#x3a;15&#x3a;07 UTC"/>
114
- <mitigation action="Approve Mitigation" description="asda" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 16&#x3a;00&#x3a;29 UTC"/>
115
- <mitigation action="Mitigate by Design" description="&#xd;Technique&#x3a; M1 &#x3a; Establish and maintain control over all of your inputs&#xd;&#xa;Specifics&#x3a; sds&#xd;&#xa;Remaining Risk&#x3a; sd&#xd;&#xa;Verification&#x3a; asd" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 15&#x3a;59&#x3a;53 UTC"/>
113
+ <mitigation action="Potential False Positive" description="testing" user="example&#x40;test.com" date="2023-01-05 16&#x3a;15&#x3a;07 UTC"/>
114
+ <mitigation action="Approve Mitigation" description="asda" user="example&#x40;test.com" date="2022-12-12 16&#x3a;00&#x3a;29 UTC"/>
115
+ <mitigation action="Mitigate by Design" description="&#xd;Technique&#x3a; M1 &#x3a; Establish and maintain control over all of your inputs&#xd;&#xa;Specifics&#x3a; sds&#xd;&#xa;Remaining Risk&#x3a; sd&#xd;&#xa;Verification&#x3a; asd" user="example&#x40;test.com" date="2022-12-12 15&#x3a;59&#x3a;53 UTC"/>
116
116
  </mitigations>
117
117
  </vulnerability>
118
118
  </vulnerabilities>
@@ -130,8 +130,8 @@
130
130
  <vulnerabilities>
131
131
  <vulnerability cve_id="CVE-2022-36033" cvss_score="6.4" severity="4" cwe_id="CWE-79" first_found_date="2022-12-12 08&#x3a;19&#x3a;48 UTC" cve_summary="jsoup is vulnerable to cross-site scripting. The vulnerability exists in &#x60;resolve&#x60; function in &#x60;StringUtil.java&#x60; because the jsoup cleaner is not properly sanitized when SafeList.preserveRelativeLinks is enabled which allows an attacker to inject and execute arbitrary javascript." severity_desc="High" mitigation="true" mitigation_type="Potential False Positive" mitigated_date="2022-12-12 08&#x3a;57&#x3a;30 UTC" vulnerability_affects_policy_compliance="false">
132
132
  <mitigations>
133
- <mitigation action="Approve Mitigation" description="testg" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 08&#x3a;57&#x3a;30 UTC"/>
134
- <mitigation action="Potential False Positive" description="testr" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 08&#x3a;57&#x3a;21 UTC"/>
133
+ <mitigation action="Approve Mitigation" description="testg" user="example&#x40;test.com" date="2022-12-12 08&#x3a;57&#x3a;30 UTC"/>
134
+ <mitigation action="Potential False Positive" description="testr" user="example&#x40;test.com" date="2022-12-12 08&#x3a;57&#x3a;21 UTC"/>
135
135
  </mitigations>
136
136
  </vulnerability>
137
137
  </vulnerabilities>
@@ -173,9 +173,9 @@
173
173
  <vulnerabilities>
174
174
  <vulnerability cve_id="SRCCLR-SID-22742" cvss_score="5.0" severity="3" cwe_id="" first_found_date="2022-12-12 08&#x3a;19&#x3a;48 UTC" cve_summary="commons-codec does not properly perform input validation on encoded values. The &#x60;decode&#x28;&#x29;&#x60; function in the Base32, Base64 and BCodec classes fails to reject malformed Base32 and Base64 encoded strings and decodes into arbitrary values. A remote attacker can leverage this vulnerability to tunnel additional information via Base32 or Base64 encoded strings that appears to be legitimate." severity_desc="Medium" mitigation="true" mitigation_type="Potential False Positive" mitigated_date="2023-01-04 17&#x3a;38&#x3a;44 UTC" vulnerability_affects_policy_compliance="false">
175
175
  <mitigations>
176
- <mitigation action="Comment" description="testing" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2023-01-04 17&#x3a;38&#x3a;44 UTC"/>
177
- <mitigation action="Approve Mitigation" description="testing" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 08&#x3a;22&#x3a;48 UTC"/>
178
- <mitigation action="Potential False Positive" description="testing" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 08&#x3a;22&#x3a;36 UTC"/>
176
+ <mitigation action="Comment" description="testing" user="example&#x40;test.com" date="2023-01-04 17&#x3a;38&#x3a;44 UTC"/>
177
+ <mitigation action="Approve Mitigation" description="testing" user="example&#x40;test.com" date="2022-12-12 08&#x3a;22&#x3a;48 UTC"/>
178
+ <mitigation action="Potential False Positive" description="testing" user="example&#x40;test.com" date="2022-12-12 08&#x3a;22&#x3a;36 UTC"/>
179
179
  </mitigations>
180
180
  </vulnerability>
181
181
  </vulnerabilities>
@@ -193,8 +193,8 @@
193
193
  <vulnerabilities>
194
194
  <vulnerability cve_id="CVE-2022-42889" cvss_score="7.5" severity="4" cwe_id="CWE-94" first_found_date="2022-12-12 08&#x3a;19&#x3a;48 UTC" cve_summary="Apache Commons Text is vulnerable to arbitrary code execution. The vulnerability exists in the &#x60;lookup&#x60; module due to insecure interpolation defaults when untrusted configuration values are used which allows an attacker to inject arbitrary code into the system." severity_desc="High" mitigation="true" mitigation_type="Potential False Positive" mitigated_date="2022-12-12 15&#x3a;58&#x3a;13 UTC" vulnerability_affects_policy_compliance="false">
195
195
  <mitigations>
196
- <mitigation action="Approve Mitigation" description="tets" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 15&#x3a;58&#x3a;13 UTC"/>
197
- <mitigation action="Potential False Positive" description="test" user="login.external.hp.comkatha.sai.manjunath.reddy&#x40;hp.com" date="2022-12-12 15&#x3a;58&#x3a;06 UTC"/>
196
+ <mitigation action="Approve Mitigation" description="tets" user="example&#x40;test.com" date="2022-12-12 15&#x3a;58&#x3a;13 UTC"/>
197
+ <mitigation action="Potential False Positive" description="test" user="example&#x40;test.com" date="2022-12-12 15&#x3a;58&#x3a;06 UTC"/>
198
198
  </mitigations>
199
199
  </vulnerability>
200
200
  </vulnerabilities>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-veracode
3
3
  version: !ruby/object:Gem::Version
4
- version: 4.14.0
4
+ version: 4.16.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Dradis Team
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-10-21 00:00:00.000000000 Z
11
+ date: 2025-05-16 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins
@@ -113,7 +113,7 @@ files:
113
113
  - lib/veracode/flaw.rb
114
114
  - lib/veracode/vulnerability.rb
115
115
  - spec/dradis/plugins/veracode/importer_spec.rb
116
- - spec/fixtures/files/veracode.xml
116
+ - spec/fixtures/files/veracode-scrubbed.xml
117
117
  - spec/spec_helper.rb
118
118
  - templates/evidence.sample
119
119
  - templates/issue.sample
@@ -144,5 +144,5 @@ specification_version: 4
144
144
  summary: Veracode add-on for the Dradis Framework.
145
145
  test_files:
146
146
  - spec/dradis/plugins/veracode/importer_spec.rb
147
- - spec/fixtures/files/veracode.xml
147
+ - spec/fixtures/files/veracode-scrubbed.xml
148
148
  - spec/spec_helper.rb