@fabasoad/sarif-to-slack 0.2.5 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.github/workflows/release.yml +1 -1
- package/.github/workflows/security.yml +0 -1
- package/.github/workflows/send-sarif-to-slack.yml +145 -73
- package/.gitleaksignore +8 -0
- package/.pre-commit-config.yaml +3 -3
- package/.tool-versions +1 -1
- package/dist/Logger.js +4 -1
- package/dist/SarifToSlackClient.d.ts +33 -0
- package/dist/SarifToSlackClient.d.ts.map +1 -0
- package/dist/SarifToSlackClient.js +178 -0
- package/dist/SlackMessageBuilder.js +34 -82
- package/dist/System.d.ts +1 -3
- package/dist/System.d.ts.map +1 -1
- package/dist/System.js +10 -3
- package/dist/index.cjs +826 -472
- package/dist/index.d.ts +35 -12
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +36 -12
- package/dist/model/Color.d.ts +80 -0
- package/dist/model/Color.d.ts.map +1 -0
- package/dist/model/Color.js +106 -0
- package/dist/model/Finding.d.ts +2 -0
- package/dist/model/Finding.d.ts.map +1 -0
- package/dist/model/Finding.js +93 -0
- package/dist/model/FindingsArray.d.ts +2 -0
- package/dist/model/FindingsArray.d.ts.map +1 -0
- package/dist/model/FindingsArray.js +24 -0
- package/dist/processors/CodeQLProcessor.d.ts +2 -0
- package/dist/processors/CodeQLProcessor.d.ts.map +1 -0
- package/dist/processors/CodeQLProcessor.js +17 -0
- package/dist/processors/CommonProcessor.d.ts +2 -0
- package/dist/processors/CommonProcessor.d.ts.map +1 -0
- package/dist/processors/CommonProcessor.js +84 -0
- package/dist/processors/ProcessorFactory.d.ts +2 -0
- package/dist/processors/ProcessorFactory.d.ts.map +1 -0
- package/dist/processors/ProcessorFactory.js +22 -0
- package/dist/processors/SnykProcessor.d.ts +2 -0
- package/dist/processors/SnykProcessor.d.ts.map +1 -0
- package/dist/processors/SnykProcessor.js +18 -0
- package/dist/representations/CompactGroupByRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRepresentation.js +58 -0
- package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRunPerLevelRepresentation.js +13 -0
- package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRunPerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactGroupByRunRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRunRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRunRepresentation.js +39 -0
- package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupBySarifPerLevelRepresentation.js +13 -0
- package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactGroupBySarifRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupBySarifRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupBySarifRepresentation.js +40 -0
- package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.js +13 -0
- package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactGroupByToolNameRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByToolNameRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByToolNameRepresentation.js +39 -0
- package/dist/representations/CompactTotalPerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactTotalPerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactTotalPerLevelRepresentation.js +13 -0
- package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactTotalPerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactTotalRepresentation.d.ts +2 -0
- package/dist/representations/CompactTotalRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactTotalRepresentation.js +25 -0
- package/dist/representations/Representation.d.ts +2 -0
- package/dist/representations/Representation.d.ts.map +1 -0
- package/dist/representations/Representation.js +28 -0
- package/dist/representations/RepresentationFactory.d.ts +2 -0
- package/dist/representations/RepresentationFactory.d.ts.map +1 -0
- package/dist/representations/RepresentationFactory.js +37 -0
- package/dist/sarif-to-slack.d.ts +347 -85
- package/dist/tsdoc-metadata.json +1 -1
- package/dist/types.d.ts +215 -51
- package/dist/types.d.ts.map +1 -1
- package/dist/types.js +225 -33
- package/dist/utils/Comparators.d.ts +2 -0
- package/dist/utils/Comparators.d.ts.map +1 -0
- package/dist/utils/Comparators.js +18 -0
- package/dist/utils/ExtendedArray.d.ts +2 -0
- package/dist/utils/ExtendedArray.d.ts.map +1 -0
- package/dist/utils/ExtendedArray.js +11 -0
- package/dist/utils/FileUtils.d.ts +2 -0
- package/dist/utils/FileUtils.d.ts.map +1 -0
- package/dist/utils/FileUtils.js +51 -0
- package/dist/utils/SarifUtils.js +20 -54
- package/etc/sarif-to-slack.api.md +162 -99
- package/jest.config.json +2 -2
- package/package.json +7 -7
- package/scripts/save-metadata.sh +12 -10
- package/src/Logger.ts +4 -0
- package/src/SarifToSlackClient.ts +202 -0
- package/src/SlackMessageBuilder.ts +35 -115
- package/src/System.ts +9 -2
- package/src/index.ts +47 -20
- package/src/model/Color.ts +195 -0
- package/src/model/Finding.ts +137 -0
- package/src/model/FindingsArray.ts +27 -0
- package/src/processors/CodeQLProcessor.ts +19 -0
- package/src/processors/CommonProcessor.ts +103 -0
- package/src/processors/ProcessorFactory.ts +23 -0
- package/src/processors/SnykProcessor.ts +19 -0
- package/src/representations/CompactGroupByRepresentation.ts +67 -0
- package/src/representations/CompactGroupByRunPerLevelRepresentation.ts +14 -0
- package/src/representations/CompactGroupByRunPerSeverityRepresentation.ts +14 -0
- package/src/representations/CompactGroupByRunRepresentation.ts +44 -0
- package/src/representations/CompactGroupBySarifPerLevelRepresentation.ts +15 -0
- package/src/representations/CompactGroupBySarifPerSeverityRepresentation.ts +15 -0
- package/src/representations/CompactGroupBySarifRepresentation.ts +45 -0
- package/src/representations/CompactGroupByToolNamePerLevelRepresentation.ts +15 -0
- package/src/representations/CompactGroupByToolNamePerSeverityRepresentation.ts +15 -0
- package/src/representations/CompactGroupByToolNameRepresentation.ts +44 -0
- package/src/representations/CompactTotalPerLevelRepresentation.ts +14 -0
- package/src/representations/CompactTotalPerSeverityRepresentation.ts +14 -0
- package/src/representations/CompactTotalRepresentation.ts +27 -0
- package/src/representations/Representation.ts +35 -0
- package/src/representations/RepresentationFactory.ts +49 -0
- package/src/types.ts +270 -53
- package/src/utils/Comparators.ts +19 -0
- package/src/utils/ExtendedArray.ts +11 -0
- package/src/utils/FileUtils.ts +60 -0
- package/src/utils/SarifUtils.ts +20 -72
- package/test-data/sarif/codeql-python.sarif +1448 -1
- package/test-data/sarif/codeql-typescript.sarif +3474 -1
- package/test-data/sarif/grype-github-actions.sarif +65 -0
- package/test-data/sarif/osv-scanner-composer.sarif +972 -0
- package/test-data/sarif/osv-scanner-container.sarif +2278 -0
- package/test-data/sarif/osv-scanner-gomodules.sarif +813 -0
- package/test-data/sarif/osv-scanner-hex.sarif +147 -0
- package/test-data/sarif/osv-scanner-maven.sarif +171 -0
- package/test-data/sarif/osv-scanner-npm.sarif +627 -0
- package/test-data/sarif/osv-scanner-pip.sarif +206 -0
- package/test-data/sarif/osv-scanner-pipenv.sarif +243 -0
- package/test-data/sarif/osv-scanner-pnpm.sarif +174 -0
- package/test-data/sarif/osv-scanner-poetry.sarif +1893 -0
- package/test-data/sarif/osv-scanner-rubygems.sarif +402 -0
- package/test-data/sarif/osv-scanner-uv.sarif +206 -0
- package/test-data/sarif/osv-scanner-yarn.sarif +5207 -0
- package/test-data/sarif/runs-0.sarif +5 -0
- package/test-data/sarif/runs-2-tools-2-results-0.sarif +1 -1
- package/test-data/sarif/runs-2-tools-2.sarif +1 -1
- package/test-data/sarif/runs-3-tools-2-results-0.sarif +1 -1
- package/test-data/sarif/runs-3-tools-2.sarif +1 -1
- package/test-data/sarif/tmp/codeql-csharp.sarif +1 -0
- package/test-data/sarif/tmp/grype-container.sarif +1774 -0
- package/test-data/sarif/tmp/runs-1-tools-1-results-0.sarif +18 -0
- package/test-data/sarif/tmp/runs-2-tools-2.sarif +686 -0
- package/test-data/sarif/trivy-iac.sarif +1 -1
- package/tests/integration/SendSarifToSlack.spec.ts +95 -27
- package/tsconfig.json +2 -0
- package/dist/Processors.d.ts +0 -2
- package/dist/Processors.d.ts.map +0 -1
- package/dist/Processors.js +0 -61
- package/dist/SarifToSlackService.d.ts +0 -39
- package/dist/SarifToSlackService.d.ts.map +0 -1
- package/dist/SarifToSlackService.js +0 -104
- package/dist/metadata.d.ts +0 -2
- package/dist/metadata.d.ts.map +0 -1
- package/dist/metadata.js +0 -11
- package/dist/model/SarifModelPerRun.d.ts +0 -2
- package/dist/model/SarifModelPerRun.d.ts.map +0 -1
- package/dist/model/SarifModelPerRun.js +0 -90
- package/dist/model/SarifModelPerSarif.d.ts +0 -2
- package/dist/model/SarifModelPerSarif.d.ts.map +0 -1
- package/dist/model/SarifModelPerSarif.js +0 -102
- package/dist/model/types.d.ts +0 -2
- package/dist/model/types.d.ts.map +0 -1
- package/dist/model/types.js +0 -49
- package/dist/utils/SortUtils.d.ts +0 -2
- package/dist/utils/SortUtils.d.ts.map +0 -1
- package/dist/utils/SortUtils.js +0 -20
- package/src/Processors.ts +0 -68
- package/src/SarifToSlackService.ts +0 -117
- package/src/metadata.ts +0 -10
- package/src/model/SarifModelPerRun.ts +0 -120
- package/src/model/SarifModelPerSarif.ts +0 -126
- package/src/model/types.ts +0 -50
- package/src/utils/SortUtils.ts +0 -33
- package/tests/Processors.spec.ts +0 -76
|
@@ -0,0 +1,147 @@
|
|
|
1
|
+
{
|
|
2
|
+
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/main/sarif-2.1/schema/sarif-schema-2.1.0.json",
|
|
3
|
+
"version": "2.1.0",
|
|
4
|
+
"runs": [
|
|
5
|
+
{
|
|
6
|
+
"addresses": [],
|
|
7
|
+
"artifacts": [
|
|
8
|
+
{
|
|
9
|
+
"length": -1,
|
|
10
|
+
"location": {
|
|
11
|
+
"index": -1,
|
|
12
|
+
"uri": "file:///Users/john.doe/projects/elixir/hex/mix.lock"
|
|
13
|
+
},
|
|
14
|
+
"parentIndex": -1,
|
|
15
|
+
"roles": []
|
|
16
|
+
}
|
|
17
|
+
],
|
|
18
|
+
"graphs": [],
|
|
19
|
+
"invocations": [],
|
|
20
|
+
"language": "en-US",
|
|
21
|
+
"logicalLocations": [],
|
|
22
|
+
"newlineSequences": [
|
|
23
|
+
"\r\n",
|
|
24
|
+
"\n"
|
|
25
|
+
],
|
|
26
|
+
"policies": [],
|
|
27
|
+
"redactionTokens": [],
|
|
28
|
+
"results": [
|
|
29
|
+
{
|
|
30
|
+
"attachments": [],
|
|
31
|
+
"codeFlows": [],
|
|
32
|
+
"fixes": [],
|
|
33
|
+
"graphTraversals": [],
|
|
34
|
+
"graphs": [],
|
|
35
|
+
"kind": "fail",
|
|
36
|
+
"level": "warning",
|
|
37
|
+
"locations": [
|
|
38
|
+
{
|
|
39
|
+
"annotations": [],
|
|
40
|
+
"id": -1,
|
|
41
|
+
"logicalLocations": [],
|
|
42
|
+
"physicalLocation": {
|
|
43
|
+
"artifactLocation": {
|
|
44
|
+
"index": -1,
|
|
45
|
+
"uri": "file:///Users/john.doe/projects/elixir/hex/mix.lock"
|
|
46
|
+
}
|
|
47
|
+
},
|
|
48
|
+
"relationships": []
|
|
49
|
+
}
|
|
50
|
+
],
|
|
51
|
+
"message": {
|
|
52
|
+
"arguments": [],
|
|
53
|
+
"text": "Package 'paginator@bc2c01ab' is vulnerable to 'CVE-2020-15150' (also known as 'GHSA-w98m-2xqg-9cvj')."
|
|
54
|
+
},
|
|
55
|
+
"rank": -1,
|
|
56
|
+
"relatedLocations": [],
|
|
57
|
+
"ruleId": "CVE-2020-15150",
|
|
58
|
+
"ruleIndex": 0,
|
|
59
|
+
"stacks": [],
|
|
60
|
+
"taxa": []
|
|
61
|
+
},
|
|
62
|
+
{
|
|
63
|
+
"attachments": [],
|
|
64
|
+
"codeFlows": [],
|
|
65
|
+
"fixes": [],
|
|
66
|
+
"graphTraversals": [],
|
|
67
|
+
"graphs": [],
|
|
68
|
+
"kind": "fail",
|
|
69
|
+
"level": "warning",
|
|
70
|
+
"locations": [
|
|
71
|
+
{
|
|
72
|
+
"annotations": [],
|
|
73
|
+
"id": -1,
|
|
74
|
+
"logicalLocations": [],
|
|
75
|
+
"physicalLocation": {
|
|
76
|
+
"artifactLocation": {
|
|
77
|
+
"index": -1,
|
|
78
|
+
"uri": "file:///Users/john.doe/projects/elixir/hex/mix.lock"
|
|
79
|
+
}
|
|
80
|
+
},
|
|
81
|
+
"relationships": []
|
|
82
|
+
}
|
|
83
|
+
],
|
|
84
|
+
"message": {
|
|
85
|
+
"arguments": [],
|
|
86
|
+
"text": "Package 'paginator@bc2c01ab' is vulnerable to 'CVE-2020-15150' (also known as 'GHSA-w98m-2xqg-9cvj')."
|
|
87
|
+
},
|
|
88
|
+
"rank": -1,
|
|
89
|
+
"relatedLocations": [],
|
|
90
|
+
"ruleId": "CVE-2020-15150",
|
|
91
|
+
"ruleIndex": 0,
|
|
92
|
+
"stacks": [],
|
|
93
|
+
"taxa": []
|
|
94
|
+
}
|
|
95
|
+
],
|
|
96
|
+
"runAggregates": [],
|
|
97
|
+
"taxonomies": [],
|
|
98
|
+
"threadFlowLocations": [],
|
|
99
|
+
"tool": {
|
|
100
|
+
"driver": {
|
|
101
|
+
"contents": [
|
|
102
|
+
"localizedData",
|
|
103
|
+
"nonLocalizedData"
|
|
104
|
+
],
|
|
105
|
+
"informationUri": "https://github.com/google/osv-scanner",
|
|
106
|
+
"isComprehensive": false,
|
|
107
|
+
"language": "en-US",
|
|
108
|
+
"locations": [],
|
|
109
|
+
"name": "osv-scanner",
|
|
110
|
+
"notifications": [],
|
|
111
|
+
"rules": [
|
|
112
|
+
{
|
|
113
|
+
"deprecatedIds": [
|
|
114
|
+
"CVE-2020-15150",
|
|
115
|
+
"GHSA-w98m-2xqg-9cvj"
|
|
116
|
+
],
|
|
117
|
+
"fullDescription": {
|
|
118
|
+
"markdown": "There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function.\n\n### Impact\nThere is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version \u003e= 1.0.0.\n\n### Patches\nThe vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version \u003e=1.5.\n\n### Credits\n\nThank you to Peter Stöckli.",
|
|
119
|
+
"text": "There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function.\n\n### Impact\nThere is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version \u003e= 1.0.0.\n\n### Patches\nThe vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version \u003e=1.5.\n\n### Credits\n\nThank you to Peter Stöckli."
|
|
120
|
+
},
|
|
121
|
+
"help": {
|
|
122
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2020-15150](https://osv.dev/CVE-2020-15150)**.\n\n## [GHSA-w98m-2xqg-9cvj](https://osv.dev/GHSA-w98m-2xqg-9cvj)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function.\n\u003e \n\u003e ### Impact\n\u003e There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version \u003e= 1.0.0.\n\u003e \n\u003e ### Patches\n\u003e The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version \u003e=1.5.\n\u003e \n\u003e ### Credits\n\u003e \n\u003e Thank you to Peter Stöckli.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/elixir/hex/mix.lock | paginator | bc2c01abdd98281ff39b6a7439cf540091122a7927bdaabc167c61d4508f9cbb |\n| lockfile:/Users/john.doe/projects/elixir/hex/mix.lock | paginator | bc2c01abdd98281ff39b6a7439cf540091122a7927bdaabc167c61d4508f9cbb |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-w98m-2xqg-9cvj | paginator | 1.0.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/elixir/hex/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-15150\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
123
|
+
"text": "**Your dependency is vulnerable to [CVE-2020-15150](https://osv.dev/CVE-2020-15150)**.\n\n## [GHSA-w98m-2xqg-9cvj](https://osv.dev/GHSA-w98m-2xqg-9cvj)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function.\n\u003e \n\u003e ### Impact\n\u003e There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version \u003e= 1.0.0.\n\u003e \n\u003e ### Patches\n\u003e The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version \u003e=1.5.\n\u003e \n\u003e ### Credits\n\u003e \n\u003e Thank you to Peter Stöckli.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/elixir/hex/mix.lock | paginator | bc2c01abdd98281ff39b6a7439cf540091122a7927bdaabc167c61d4508f9cbb |\n| lockfile:/Users/john.doe/projects/elixir/hex/mix.lock | paginator | bc2c01abdd98281ff39b6a7439cf540091122a7927bdaabc167c61d4508f9cbb |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-w98m-2xqg-9cvj | paginator | 1.0.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/elixir/hex/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-15150\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
124
|
+
},
|
|
125
|
+
"id": "CVE-2020-15150",
|
|
126
|
+
"name": "CVE-2020-15150",
|
|
127
|
+
"relationships": [],
|
|
128
|
+
"shortDescription": {
|
|
129
|
+
"markdown": "CVE-2020-15150: Remote Code Execution in paginator",
|
|
130
|
+
"text": "CVE-2020-15150: Remote Code Execution in paginator"
|
|
131
|
+
}
|
|
132
|
+
}
|
|
133
|
+
],
|
|
134
|
+
"supportedTaxonomies": [],
|
|
135
|
+
"taxa": [],
|
|
136
|
+
"version": "2.2.0"
|
|
137
|
+
},
|
|
138
|
+
"extensions": []
|
|
139
|
+
},
|
|
140
|
+
"translations": [],
|
|
141
|
+
"versionControlProvenance": [],
|
|
142
|
+
"webRequests": [],
|
|
143
|
+
"webResponses": []
|
|
144
|
+
}
|
|
145
|
+
],
|
|
146
|
+
"properties": {}
|
|
147
|
+
}
|
|
@@ -0,0 +1,171 @@
|
|
|
1
|
+
{
|
|
2
|
+
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/main/sarif-2.1/schema/sarif-schema-2.1.0.json",
|
|
3
|
+
"version": "2.1.0",
|
|
4
|
+
"runs": [
|
|
5
|
+
{
|
|
6
|
+
"addresses": [],
|
|
7
|
+
"artifacts": [
|
|
8
|
+
{
|
|
9
|
+
"length": -1,
|
|
10
|
+
"location": {
|
|
11
|
+
"index": -1,
|
|
12
|
+
"uri": "file:///Users/john.doe/projects/java/maven/pom.xml"
|
|
13
|
+
},
|
|
14
|
+
"parentIndex": -1,
|
|
15
|
+
"roles": []
|
|
16
|
+
}
|
|
17
|
+
],
|
|
18
|
+
"graphs": [],
|
|
19
|
+
"invocations": [],
|
|
20
|
+
"language": "en-US",
|
|
21
|
+
"logicalLocations": [],
|
|
22
|
+
"newlineSequences": [
|
|
23
|
+
"\r\n",
|
|
24
|
+
"\n"
|
|
25
|
+
],
|
|
26
|
+
"policies": [],
|
|
27
|
+
"redactionTokens": [],
|
|
28
|
+
"results": [
|
|
29
|
+
{
|
|
30
|
+
"attachments": [],
|
|
31
|
+
"codeFlows": [],
|
|
32
|
+
"fixes": [],
|
|
33
|
+
"graphTraversals": [],
|
|
34
|
+
"graphs": [],
|
|
35
|
+
"kind": "fail",
|
|
36
|
+
"level": "warning",
|
|
37
|
+
"locations": [
|
|
38
|
+
{
|
|
39
|
+
"annotations": [],
|
|
40
|
+
"id": -1,
|
|
41
|
+
"logicalLocations": [],
|
|
42
|
+
"physicalLocation": {
|
|
43
|
+
"artifactLocation": {
|
|
44
|
+
"index": -1,
|
|
45
|
+
"uri": "file:///Users/john.doe/projects/java/maven/pom.xml"
|
|
46
|
+
}
|
|
47
|
+
},
|
|
48
|
+
"relationships": []
|
|
49
|
+
}
|
|
50
|
+
],
|
|
51
|
+
"message": {
|
|
52
|
+
"arguments": [],
|
|
53
|
+
"text": "Package 'commons-collections:commons-collections@3.2.1' is vulnerable to 'CVE-2015-6420' (also known as 'GHSA-6hgm-866r-3cjv')."
|
|
54
|
+
},
|
|
55
|
+
"rank": -1,
|
|
56
|
+
"relatedLocations": [],
|
|
57
|
+
"ruleId": "CVE-2015-6420",
|
|
58
|
+
"ruleIndex": 0,
|
|
59
|
+
"stacks": [],
|
|
60
|
+
"taxa": []
|
|
61
|
+
},
|
|
62
|
+
{
|
|
63
|
+
"attachments": [],
|
|
64
|
+
"codeFlows": [],
|
|
65
|
+
"fixes": [],
|
|
66
|
+
"graphTraversals": [],
|
|
67
|
+
"graphs": [],
|
|
68
|
+
"kind": "fail",
|
|
69
|
+
"level": "warning",
|
|
70
|
+
"locations": [
|
|
71
|
+
{
|
|
72
|
+
"annotations": [],
|
|
73
|
+
"id": -1,
|
|
74
|
+
"logicalLocations": [],
|
|
75
|
+
"physicalLocation": {
|
|
76
|
+
"artifactLocation": {
|
|
77
|
+
"index": -1,
|
|
78
|
+
"uri": "file:///Users/john.doe/projects/java/maven/pom.xml"
|
|
79
|
+
}
|
|
80
|
+
},
|
|
81
|
+
"relationships": []
|
|
82
|
+
}
|
|
83
|
+
],
|
|
84
|
+
"message": {
|
|
85
|
+
"arguments": [],
|
|
86
|
+
"text": "Package 'commons-collections:commons-collections@3.2.1' is vulnerable to 'CVE-2015-7501' (also known as 'GHSA-fjq5-5j5f-mvxh')."
|
|
87
|
+
},
|
|
88
|
+
"rank": -1,
|
|
89
|
+
"relatedLocations": [],
|
|
90
|
+
"ruleId": "CVE-2015-7501",
|
|
91
|
+
"ruleIndex": 1,
|
|
92
|
+
"stacks": [],
|
|
93
|
+
"taxa": []
|
|
94
|
+
}
|
|
95
|
+
],
|
|
96
|
+
"runAggregates": [],
|
|
97
|
+
"taxonomies": [],
|
|
98
|
+
"threadFlowLocations": [],
|
|
99
|
+
"tool": {
|
|
100
|
+
"driver": {
|
|
101
|
+
"contents": [
|
|
102
|
+
"localizedData",
|
|
103
|
+
"nonLocalizedData"
|
|
104
|
+
],
|
|
105
|
+
"informationUri": "https://github.com/google/osv-scanner",
|
|
106
|
+
"isComprehensive": false,
|
|
107
|
+
"language": "en-US",
|
|
108
|
+
"locations": [],
|
|
109
|
+
"name": "osv-scanner",
|
|
110
|
+
"notifications": [],
|
|
111
|
+
"rules": [
|
|
112
|
+
{
|
|
113
|
+
"deprecatedIds": [
|
|
114
|
+
"CVE-2015-6420",
|
|
115
|
+
"GHSA-6hgm-866r-3cjv"
|
|
116
|
+
],
|
|
117
|
+
"fullDescription": {
|
|
118
|
+
"markdown": "Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object.",
|
|
119
|
+
"text": "Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object."
|
|
120
|
+
},
|
|
121
|
+
"help": {
|
|
122
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2015-6420](https://osv.dev/CVE-2015-6420)**.\n\n## [GHSA-6hgm-866r-3cjv](https://osv.dev/GHSA-6hgm-866r-3cjv)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/java/maven/pom.xml | commons-collections:commons-collections | 3.2.1 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-6hgm-866r-3cjv | org.apache.commons:commons-collections4 | 4.1 |\n| GHSA-6hgm-866r-3cjv | commons-collections:commons-collections | 3.2.2 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/java/maven/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2015-6420\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
123
|
+
"text": "**Your dependency is vulnerable to [CVE-2015-6420](https://osv.dev/CVE-2015-6420)**.\n\n## [GHSA-6hgm-866r-3cjv](https://osv.dev/GHSA-6hgm-866r-3cjv)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/java/maven/pom.xml | commons-collections:commons-collections | 3.2.1 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-6hgm-866r-3cjv | org.apache.commons:commons-collections4 | 4.1 |\n| GHSA-6hgm-866r-3cjv | commons-collections:commons-collections | 3.2.2 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/java/maven/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2015-6420\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
124
|
+
},
|
|
125
|
+
"id": "CVE-2015-6420",
|
|
126
|
+
"name": "CVE-2015-6420",
|
|
127
|
+
"relationships": [],
|
|
128
|
+
"shortDescription": {
|
|
129
|
+
"markdown": "CVE-2015-6420: Insecure Deserialization in Apache Commons Collection",
|
|
130
|
+
"text": "CVE-2015-6420: Insecure Deserialization in Apache Commons Collection"
|
|
131
|
+
}
|
|
132
|
+
},
|
|
133
|
+
{
|
|
134
|
+
"deprecatedIds": [
|
|
135
|
+
"CVE-2015-7501",
|
|
136
|
+
"GHSA-fjq5-5j5f-mvxh"
|
|
137
|
+
],
|
|
138
|
+
"fullDescription": {
|
|
139
|
+
"markdown": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.",
|
|
140
|
+
"text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library."
|
|
141
|
+
},
|
|
142
|
+
"help": {
|
|
143
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2015-7501](https://osv.dev/CVE-2015-7501)**.\n\n## [GHSA-fjq5-5j5f-mvxh](https://osv.dev/GHSA-fjq5-5j5f-mvxh)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/java/maven/pom.xml | commons-collections:commons-collections | 3.2.1 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-fjq5-5j5f-mvxh | commons-collections:commons-collections | 3.2.2 |\n| GHSA-fjq5-5j5f-mvxh | org.apache.commons:commons-collections4 | 4.1 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/java/maven/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2015-7501\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
144
|
+
"text": "**Your dependency is vulnerable to [CVE-2015-7501](https://osv.dev/CVE-2015-7501)**.\n\n## [GHSA-fjq5-5j5f-mvxh](https://osv.dev/GHSA-fjq5-5j5f-mvxh)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/java/maven/pom.xml | commons-collections:commons-collections | 3.2.1 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-fjq5-5j5f-mvxh | commons-collections:commons-collections | 3.2.2 |\n| GHSA-fjq5-5j5f-mvxh | org.apache.commons:commons-collections4 | 4.1 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/java/maven/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2015-7501\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
145
|
+
},
|
|
146
|
+
"id": "CVE-2015-7501",
|
|
147
|
+
"name": "CVE-2015-7501",
|
|
148
|
+
"properties": {
|
|
149
|
+
"security-severity": "9.8"
|
|
150
|
+
},
|
|
151
|
+
"relationships": [],
|
|
152
|
+
"shortDescription": {
|
|
153
|
+
"markdown": "CVE-2015-7501: Deserialization of Untrusted Data in Apache commons collections",
|
|
154
|
+
"text": "CVE-2015-7501: Deserialization of Untrusted Data in Apache commons collections"
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
],
|
|
158
|
+
"supportedTaxonomies": [],
|
|
159
|
+
"taxa": [],
|
|
160
|
+
"version": "2.2.0"
|
|
161
|
+
},
|
|
162
|
+
"extensions": []
|
|
163
|
+
},
|
|
164
|
+
"translations": [],
|
|
165
|
+
"versionControlProvenance": [],
|
|
166
|
+
"webRequests": [],
|
|
167
|
+
"webResponses": []
|
|
168
|
+
}
|
|
169
|
+
],
|
|
170
|
+
"properties": {}
|
|
171
|
+
}
|