-
Notifications
You must be signed in to change notification settings - Fork 13
ROX-18001: add drools CPE for CVE-2021-41411 #1205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Images are ready for the commit at ef4db9e. To use the images, use the tag |
@dcaravel for CI to pick up the added vuln, you'd need to add the |
/retest |
1 similar comment
/retest |
/retest |
/retest ci/prow/images |
@dcaravel: The
The following commands are available to trigger optional jobs:
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/test images |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, there is a comment on FixedBy, but if you confirm it's correct, I am OK to merge. Hence, approving.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for adding the test for this.
Description: "drools <=7.59.x is affected by an XML External Entity (XXE) vulnerability in KieModuleMarshaller.java. The Validator class is not used correctly, resulting in the XXE injection vulnerability.", | ||
Link: "https://nvd.nist.gov/vuln/detail/CVE-2021-41411", | ||
Severity: "Critical", | ||
FixedBy: "7.60.0.Final", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Up to (excluding)
I believe is meant to mean all versions prior to 7.6.0
but not including 7.6.0
itself. The NVD data appears bad, the description in NVD contradicts the highlighted section and starts with drools <=7.59.x is affected by ...
(notice y version 59
in double digits as opposed to the 6
in the CPE block). The GitHub advisory data appears accurate and uses versions that match the actual package (ie: x.y.z.Final
):
CVE was not being matched with drool's jars due to vendor name mismatch.
Related ticket: https://issues.redhat.com/browse/ROX-18001
Testing
quay.io/rhacs-eng/qa:drools-CVE-2021-41411
fromscratch
containing onlyorg.drools.drools-core-6.4.0.Final.jar
e2etests/testcase_test.go
TestGRPCGetImageVulnerabilities
to only execute newly added testpkg/vulnloader/nvdloader/manual.go
with additional CPE based on NVD entry from2021.json
in dumpbuild-updater
and ran it to produce new dumps2021.json
had new CPE for CVEmake image
, and deployed locallymake deploy-local
TestGRPCGetImageVulnerabilities