@fabasoad/sarif-to-slack 0.2.4 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (193) hide show
  1. package/.github/workflows/release.yml +1 -1
  2. package/.github/workflows/security.yml +0 -1
  3. package/.github/workflows/send-sarif-to-slack.yml +148 -76
  4. package/.gitleaksignore +8 -0
  5. package/.pre-commit-config.yaml +3 -3
  6. package/.tool-versions +1 -1
  7. package/dist/Logger.js +4 -1
  8. package/dist/SarifToSlackClient.d.ts +33 -0
  9. package/dist/SarifToSlackClient.d.ts.map +1 -0
  10. package/dist/SarifToSlackClient.js +178 -0
  11. package/dist/SlackMessageBuilder.js +34 -82
  12. package/dist/System.d.ts +2 -0
  13. package/dist/System.d.ts.map +1 -0
  14. package/dist/System.js +15 -0
  15. package/dist/index.cjs +843 -467
  16. package/dist/index.d.ts +35 -12
  17. package/dist/index.d.ts.map +1 -1
  18. package/dist/index.js +36 -12
  19. package/dist/model/Color.d.ts +70 -0
  20. package/dist/model/Color.d.ts.map +1 -0
  21. package/dist/model/Color.js +119 -0
  22. package/dist/model/Finding.d.ts +2 -0
  23. package/dist/model/Finding.d.ts.map +1 -0
  24. package/dist/model/Finding.js +93 -0
  25. package/dist/model/FindingsArray.d.ts +2 -0
  26. package/dist/model/FindingsArray.d.ts.map +1 -0
  27. package/dist/model/FindingsArray.js +24 -0
  28. package/dist/processors/CodeQLProcessor.d.ts +2 -0
  29. package/dist/processors/CodeQLProcessor.d.ts.map +1 -0
  30. package/dist/processors/CodeQLProcessor.js +17 -0
  31. package/dist/processors/CommonProcessor.d.ts +2 -0
  32. package/dist/processors/CommonProcessor.d.ts.map +1 -0
  33. package/dist/processors/CommonProcessor.js +84 -0
  34. package/dist/processors/ProcessorFactory.d.ts +2 -0
  35. package/dist/processors/ProcessorFactory.d.ts.map +1 -0
  36. package/dist/processors/ProcessorFactory.js +22 -0
  37. package/dist/processors/SnykProcessor.d.ts +2 -0
  38. package/dist/processors/SnykProcessor.d.ts.map +1 -0
  39. package/dist/processors/SnykProcessor.js +18 -0
  40. package/dist/representations/CompactGroupByRepresentation.d.ts +2 -0
  41. package/dist/representations/CompactGroupByRepresentation.d.ts.map +1 -0
  42. package/dist/representations/CompactGroupByRepresentation.js +58 -0
  43. package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts +2 -0
  44. package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts.map +1 -0
  45. package/dist/representations/CompactGroupByRunPerLevelRepresentation.js +13 -0
  46. package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts +2 -0
  47. package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts.map +1 -0
  48. package/dist/representations/CompactGroupByRunPerSeverityRepresentation.js +13 -0
  49. package/dist/representations/CompactGroupByRunRepresentation.d.ts +2 -0
  50. package/dist/representations/CompactGroupByRunRepresentation.d.ts.map +1 -0
  51. package/dist/representations/CompactGroupByRunRepresentation.js +39 -0
  52. package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts +2 -0
  53. package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts.map +1 -0
  54. package/dist/representations/CompactGroupBySarifPerLevelRepresentation.js +13 -0
  55. package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts +2 -0
  56. package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts.map +1 -0
  57. package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.js +13 -0
  58. package/dist/representations/CompactGroupBySarifRepresentation.d.ts +2 -0
  59. package/dist/representations/CompactGroupBySarifRepresentation.d.ts.map +1 -0
  60. package/dist/representations/CompactGroupBySarifRepresentation.js +40 -0
  61. package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts +2 -0
  62. package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts.map +1 -0
  63. package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.js +13 -0
  64. package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts +2 -0
  65. package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts.map +1 -0
  66. package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.js +13 -0
  67. package/dist/representations/CompactGroupByToolNameRepresentation.d.ts +2 -0
  68. package/dist/representations/CompactGroupByToolNameRepresentation.d.ts.map +1 -0
  69. package/dist/representations/CompactGroupByToolNameRepresentation.js +39 -0
  70. package/dist/representations/CompactTotalPerLevelRepresentation.d.ts +2 -0
  71. package/dist/representations/CompactTotalPerLevelRepresentation.d.ts.map +1 -0
  72. package/dist/representations/CompactTotalPerLevelRepresentation.js +13 -0
  73. package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts +2 -0
  74. package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts.map +1 -0
  75. package/dist/representations/CompactTotalPerSeverityRepresentation.js +13 -0
  76. package/dist/representations/CompactTotalRepresentation.d.ts +2 -0
  77. package/dist/representations/CompactTotalRepresentation.d.ts.map +1 -0
  78. package/dist/representations/CompactTotalRepresentation.js +25 -0
  79. package/dist/representations/Representation.d.ts +2 -0
  80. package/dist/representations/Representation.d.ts.map +1 -0
  81. package/dist/representations/Representation.js +28 -0
  82. package/dist/representations/RepresentationFactory.d.ts +2 -0
  83. package/dist/representations/RepresentationFactory.d.ts.map +1 -0
  84. package/dist/representations/RepresentationFactory.js +37 -0
  85. package/dist/sarif-to-slack.d.ts +337 -85
  86. package/dist/tsdoc-metadata.json +1 -1
  87. package/dist/types.d.ts +215 -51
  88. package/dist/types.d.ts.map +1 -1
  89. package/dist/types.js +225 -33
  90. package/dist/utils/Comparators.d.ts +2 -0
  91. package/dist/utils/Comparators.d.ts.map +1 -0
  92. package/dist/utils/Comparators.js +18 -0
  93. package/dist/utils/ExtendedArray.d.ts +2 -0
  94. package/dist/utils/ExtendedArray.d.ts.map +1 -0
  95. package/dist/utils/ExtendedArray.js +11 -0
  96. package/dist/utils/FileUtils.d.ts +2 -0
  97. package/dist/utils/FileUtils.d.ts.map +1 -0
  98. package/dist/utils/FileUtils.js +51 -0
  99. package/dist/utils/SarifUtils.js +19 -53
  100. package/etc/sarif-to-slack.api.md +161 -99
  101. package/jest.config.json +2 -2
  102. package/package.json +9 -9
  103. package/scripts/save-metadata.sh +15 -0
  104. package/src/Logger.ts +4 -0
  105. package/src/SarifToSlackClient.ts +202 -0
  106. package/src/SlackMessageBuilder.ts +35 -115
  107. package/src/System.ts +16 -0
  108. package/src/index.ts +47 -20
  109. package/src/model/Color.ts +201 -0
  110. package/src/model/Finding.ts +137 -0
  111. package/src/model/FindingsArray.ts +27 -0
  112. package/src/processors/CodeQLProcessor.ts +19 -0
  113. package/src/processors/CommonProcessor.ts +103 -0
  114. package/src/processors/ProcessorFactory.ts +23 -0
  115. package/src/processors/SnykProcessor.ts +19 -0
  116. package/src/representations/CompactGroupByRepresentation.ts +67 -0
  117. package/src/representations/CompactGroupByRunPerLevelRepresentation.ts +14 -0
  118. package/src/representations/CompactGroupByRunPerSeverityRepresentation.ts +14 -0
  119. package/src/representations/CompactGroupByRunRepresentation.ts +44 -0
  120. package/src/representations/CompactGroupBySarifPerLevelRepresentation.ts +15 -0
  121. package/src/representations/CompactGroupBySarifPerSeverityRepresentation.ts +15 -0
  122. package/src/representations/CompactGroupBySarifRepresentation.ts +45 -0
  123. package/src/representations/CompactGroupByToolNamePerLevelRepresentation.ts +15 -0
  124. package/src/representations/CompactGroupByToolNamePerSeverityRepresentation.ts +15 -0
  125. package/src/representations/CompactGroupByToolNameRepresentation.ts +44 -0
  126. package/src/representations/CompactTotalPerLevelRepresentation.ts +14 -0
  127. package/src/representations/CompactTotalPerSeverityRepresentation.ts +14 -0
  128. package/src/representations/CompactTotalRepresentation.ts +27 -0
  129. package/src/representations/Representation.ts +35 -0
  130. package/src/representations/RepresentationFactory.ts +49 -0
  131. package/src/types.ts +270 -53
  132. package/src/utils/Comparators.ts +19 -0
  133. package/src/utils/ExtendedArray.ts +11 -0
  134. package/src/utils/FileUtils.ts +60 -0
  135. package/src/utils/SarifUtils.ts +19 -71
  136. package/test-data/sarif/codeql-python.sarif +1448 -1
  137. package/test-data/sarif/codeql-typescript.sarif +3474 -1
  138. package/test-data/sarif/grype-github-actions.sarif +65 -0
  139. package/test-data/sarif/osv-scanner-composer.sarif +972 -0
  140. package/test-data/sarif/osv-scanner-container.sarif +2278 -0
  141. package/test-data/sarif/osv-scanner-gomodules.sarif +813 -0
  142. package/test-data/sarif/osv-scanner-hex.sarif +147 -0
  143. package/test-data/sarif/osv-scanner-maven.sarif +171 -0
  144. package/test-data/sarif/osv-scanner-npm.sarif +627 -0
  145. package/test-data/sarif/osv-scanner-pip.sarif +206 -0
  146. package/test-data/sarif/osv-scanner-pipenv.sarif +243 -0
  147. package/test-data/sarif/osv-scanner-pnpm.sarif +174 -0
  148. package/test-data/sarif/osv-scanner-poetry.sarif +1893 -0
  149. package/test-data/sarif/osv-scanner-rubygems.sarif +402 -0
  150. package/test-data/sarif/osv-scanner-uv.sarif +206 -0
  151. package/test-data/sarif/osv-scanner-yarn.sarif +5207 -0
  152. package/test-data/sarif/runs-0.sarif +5 -0
  153. package/test-data/sarif/runs-2-tools-2-results-0.sarif +1 -1
  154. package/test-data/sarif/runs-2-tools-2.sarif +1 -1
  155. package/test-data/sarif/runs-3-tools-2-results-0.sarif +1 -1
  156. package/test-data/sarif/runs-3-tools-2.sarif +1 -1
  157. package/test-data/sarif/tmp/codeql-csharp.sarif +1 -0
  158. package/test-data/sarif/tmp/grype-container.sarif +1774 -0
  159. package/test-data/sarif/tmp/runs-1-tools-1-results-0.sarif +18 -0
  160. package/test-data/sarif/tmp/runs-2-tools-2.sarif +686 -0
  161. package/test-data/sarif/trivy-iac.sarif +1 -1
  162. package/tests/integration/SendSarifToSlack.spec.ts +95 -27
  163. package/tsconfig.json +2 -0
  164. package/dist/Processors.d.ts +0 -2
  165. package/dist/Processors.d.ts.map +0 -1
  166. package/dist/Processors.js +0 -61
  167. package/dist/SarifToSlackService.d.ts +0 -39
  168. package/dist/SarifToSlackService.d.ts.map +0 -1
  169. package/dist/SarifToSlackService.js +0 -102
  170. package/dist/model/SarifModelPerRun.d.ts +0 -2
  171. package/dist/model/SarifModelPerRun.d.ts.map +0 -1
  172. package/dist/model/SarifModelPerRun.js +0 -90
  173. package/dist/model/SarifModelPerSarif.d.ts +0 -2
  174. package/dist/model/SarifModelPerSarif.d.ts.map +0 -1
  175. package/dist/model/SarifModelPerSarif.js +0 -102
  176. package/dist/model/types.d.ts +0 -2
  177. package/dist/model/types.d.ts.map +0 -1
  178. package/dist/model/types.js +0 -49
  179. package/dist/utils/SortUtils.d.ts +0 -2
  180. package/dist/utils/SortUtils.d.ts.map +0 -1
  181. package/dist/utils/SortUtils.js +0 -20
  182. package/dist/version.d.ts +0 -2
  183. package/dist/version.d.ts.map +0 -1
  184. package/dist/version.js +0 -11
  185. package/scripts/save-version.sh +0 -13
  186. package/src/Processors.ts +0 -68
  187. package/src/SarifToSlackService.ts +0 -115
  188. package/src/model/SarifModelPerRun.ts +0 -123
  189. package/src/model/SarifModelPerSarif.ts +0 -126
  190. package/src/model/types.ts +0 -50
  191. package/src/utils/SortUtils.ts +0 -33
  192. package/src/version.ts +0 -10
  193. package/tests/Processors.spec.ts +0 -76
@@ -0,0 +1,206 @@
1
+ {
2
+ "$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/main/sarif-2.1/schema/sarif-schema-2.1.0.json",
3
+ "version": "2.1.0",
4
+ "runs": [
5
+ {
6
+ "addresses": [],
7
+ "artifacts": [
8
+ {
9
+ "length": -1,
10
+ "location": {
11
+ "index": -1,
12
+ "uri": "file:///Users/john.doe/projects/python/uv/uv.lock"
13
+ },
14
+ "parentIndex": -1,
15
+ "roles": []
16
+ }
17
+ ],
18
+ "graphs": [],
19
+ "invocations": [],
20
+ "language": "en-US",
21
+ "logicalLocations": [],
22
+ "newlineSequences": [
23
+ "\r\n",
24
+ "\n"
25
+ ],
26
+ "policies": [],
27
+ "redactionTokens": [],
28
+ "results": [
29
+ {
30
+ "attachments": [],
31
+ "codeFlows": [],
32
+ "fixes": [],
33
+ "graphTraversals": [],
34
+ "graphs": [],
35
+ "kind": "fail",
36
+ "level": "warning",
37
+ "locations": [
38
+ {
39
+ "annotations": [],
40
+ "id": -1,
41
+ "logicalLocations": [],
42
+ "physicalLocation": {
43
+ "artifactLocation": {
44
+ "index": -1,
45
+ "uri": "file:///Users/john.doe/projects/python/uv/uv.lock"
46
+ }
47
+ },
48
+ "relationships": []
49
+ }
50
+ ],
51
+ "message": {
52
+ "arguments": [],
53
+ "text": "Package 'py@1.4.26' is vulnerable to 'CVE-2020-29651' (also known as 'PYSEC-2020-92', 'GHSA-hj5v-574p-mj7c')."
54
+ },
55
+ "rank": -1,
56
+ "relatedLocations": [],
57
+ "ruleId": "CVE-2020-29651",
58
+ "ruleIndex": 0,
59
+ "stacks": [],
60
+ "taxa": []
61
+ },
62
+ {
63
+ "attachments": [],
64
+ "codeFlows": [],
65
+ "fixes": [],
66
+ "graphTraversals": [],
67
+ "graphs": [],
68
+ "kind": "fail",
69
+ "level": "warning",
70
+ "locations": [
71
+ {
72
+ "annotations": [],
73
+ "id": -1,
74
+ "logicalLocations": [],
75
+ "physicalLocation": {
76
+ "artifactLocation": {
77
+ "index": -1,
78
+ "uri": "file:///Users/john.doe/projects/python/uv/uv.lock"
79
+ }
80
+ },
81
+ "relationships": []
82
+ }
83
+ ],
84
+ "message": {
85
+ "arguments": [],
86
+ "text": "Package 'py@1.4.26' is vulnerable to 'CVE-2020-29651' (also known as 'PYSEC-2020-92', 'GHSA-hj5v-574p-mj7c')."
87
+ },
88
+ "rank": -1,
89
+ "relatedLocations": [],
90
+ "ruleId": "CVE-2020-29651",
91
+ "ruleIndex": 0,
92
+ "stacks": [],
93
+ "taxa": []
94
+ },
95
+ {
96
+ "attachments": [],
97
+ "codeFlows": [],
98
+ "fixes": [],
99
+ "graphTraversals": [],
100
+ "graphs": [],
101
+ "kind": "fail",
102
+ "level": "warning",
103
+ "locations": [
104
+ {
105
+ "annotations": [],
106
+ "id": -1,
107
+ "logicalLocations": [],
108
+ "physicalLocation": {
109
+ "artifactLocation": {
110
+ "index": -1,
111
+ "uri": "file:///Users/john.doe/projects/python/uv/uv.lock"
112
+ }
113
+ },
114
+ "relationships": []
115
+ }
116
+ ],
117
+ "message": {
118
+ "arguments": [],
119
+ "text": "Package 'py@1.4.26' is vulnerable to 'CVE-2022-42969' (also known as 'PYSEC-2022-42969', 'GHSA-w596-4wvx-j9j6')."
120
+ },
121
+ "rank": -1,
122
+ "relatedLocations": [],
123
+ "ruleId": "CVE-2022-42969",
124
+ "ruleIndex": 1,
125
+ "stacks": [],
126
+ "taxa": []
127
+ }
128
+ ],
129
+ "runAggregates": [],
130
+ "taxonomies": [],
131
+ "threadFlowLocations": [],
132
+ "tool": {
133
+ "driver": {
134
+ "contents": [
135
+ "localizedData",
136
+ "nonLocalizedData"
137
+ ],
138
+ "informationUri": "https://github.com/google/osv-scanner",
139
+ "isComprehensive": false,
140
+ "language": "en-US",
141
+ "locations": [],
142
+ "name": "osv-scanner",
143
+ "notifications": [],
144
+ "rules": [
145
+ {
146
+ "deprecatedIds": [
147
+ "CVE-2020-29651",
148
+ "PYSEC-2020-92",
149
+ "GHSA-hj5v-574p-mj7c"
150
+ ],
151
+ "fullDescription": {
152
+ "markdown": "A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.",
153
+ "text": "A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality."
154
+ },
155
+ "help": {
156
+ "markdown": "**Your dependency is vulnerable to [CVE-2020-29651](https://osv.dev/CVE-2020-29651)**\n(Also published as: [PYSEC-2020-92](https://osv.dev/PYSEC-2020-92), [GHSA-hj5v-574p-mj7c](https://osv.dev/GHSA-hj5v-574p-mj7c), ).\n\n## [PYSEC-2020-92](https://osv.dev/PYSEC-2020-92)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.\n\n\u003c/details\u003e\n\n## [GHSA-hj5v-574p-mj7c](https://osv.dev/GHSA-hj5v-574p-mj7c)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/python/uv/uv.lock | py | 1.4.26 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-hj5v-574p-mj7c | py | 1.10.0 |\n| PYSEC-2020-92 | py | 1.10.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/python/uv/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-29651\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
157
+ "text": "**Your dependency is vulnerable to [CVE-2020-29651](https://osv.dev/CVE-2020-29651)**\n(Also published as: [PYSEC-2020-92](https://osv.dev/PYSEC-2020-92), [GHSA-hj5v-574p-mj7c](https://osv.dev/GHSA-hj5v-574p-mj7c), ).\n\n## [PYSEC-2020-92](https://osv.dev/PYSEC-2020-92)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.\n\n\u003c/details\u003e\n\n## [GHSA-hj5v-574p-mj7c](https://osv.dev/GHSA-hj5v-574p-mj7c)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/python/uv/uv.lock | py | 1.4.26 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-hj5v-574p-mj7c | py | 1.10.0 |\n| PYSEC-2020-92 | py | 1.10.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/python/uv/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-29651\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
158
+ },
159
+ "id": "CVE-2020-29651",
160
+ "name": "CVE-2020-29651",
161
+ "properties": {
162
+ "security-severity": "8.7"
163
+ },
164
+ "relationships": [],
165
+ "shortDescription": {
166
+ "markdown": "CVE-2020-29651: py vulnerable to Regular Expression Denial of Service",
167
+ "text": "CVE-2020-29651: py vulnerable to Regular Expression Denial of Service"
168
+ }
169
+ },
170
+ {
171
+ "deprecatedIds": [
172
+ "CVE-2022-42969",
173
+ "PYSEC-2022-42969",
174
+ "GHSA-w596-4wvx-j9j6"
175
+ ],
176
+ "fullDescription": {
177
+ "markdown": "",
178
+ "text": ""
179
+ },
180
+ "help": {
181
+ "markdown": "**Your dependency is vulnerable to [CVE-2022-42969](https://osv.dev/CVE-2022-42969)**.\n\n## [PYSEC-2022-42969](https://osv.dev/PYSEC-2022-42969)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/python/uv/uv.lock | py | 1.4.26 |\n\n## Remediation\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/python/uv/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2022-42969\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
182
+ "text": "**Your dependency is vulnerable to [CVE-2022-42969](https://osv.dev/CVE-2022-42969)**.\n\n## [PYSEC-2022-42969](https://osv.dev/PYSEC-2022-42969)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/python/uv/uv.lock | py | 1.4.26 |\n\n## Remediation\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/python/uv/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2022-42969\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
183
+ },
184
+ "id": "CVE-2022-42969",
185
+ "name": "CVE-2022-42969",
186
+ "relationships": [],
187
+ "shortDescription": {
188
+ "markdown": "CVE-2022-42969",
189
+ "text": "CVE-2022-42969"
190
+ }
191
+ }
192
+ ],
193
+ "supportedTaxonomies": [],
194
+ "taxa": [],
195
+ "version": "2.2.0"
196
+ },
197
+ "extensions": []
198
+ },
199
+ "translations": [],
200
+ "versionControlProvenance": [],
201
+ "webRequests": [],
202
+ "webResponses": []
203
+ }
204
+ ],
205
+ "properties": {}
206
+ }