Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions vulnerabilities/importers/debian.py
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,7 @@ def validate_schema(advisory_dict):

deb_versions = [
"bullseye",
"bullseye-security",
"buster",
"buster-security",
"sid",
Expand Down
4 changes: 2 additions & 2 deletions vulnerabilities/importers/project_kb_msr2019.py
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ class ProjectKBMSRDataSource(DataSource):

CONFIG_CLASS = ProjectKBDataSourceConfiguration

url = "https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv" # nopep8
url = "https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv"

def updated_advisories(self):
if create_etag(data_src=self, url=self.url, etag_key="ETag"):
Expand Down Expand Up @@ -82,7 +82,7 @@ def to_advisories(csv_reader):
summary="",
impacted_package_urls=[],
references=[reference],
cve_id=vuln_id,
vulnerability_id=vuln_id,
)
)

Expand Down
7 changes: 7 additions & 0 deletions vulnerabilities/tests/test_data/kbmsr2019/test_msr_data.csv
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
CVE-2018-11040,https://github.com/spring-projects/spring-framework,874859493bbda59739c38c7e52eb3625f247b93,pos
CVE-2013-6408,https://github.com/apache/lucene-solr,7239a57a51ea0f4d05dd330ce5e15e4f72f72747,pos
CVE-2015-6748,https://github.com/jhy/jsoup,4edb78991f8d0bf87dafde5e01ccd8922065c9b2,pos
CVE-2018-14658,https://github.com/keycloak/keycloak,a957e118e6efb35fe7ef3a62acd66341a6523cb7,pos
CVE-2017-1000355,https://github.com/jenkinsci/jenkins,701ea95a52afe53bee28f76a3f96eb0e578852e9,pos
CVE-2018-1000844,https://github.com/square/retrofit,97057aaae42e54bfbee8acfa8af7dcf37e812342,pos
HTTPCLIENT-1803,https://github.com/apache/httpcomponents-client,0554271750599756d4946c0d7ba43d04b1a7b22,pos
141 changes: 141 additions & 0 deletions vulnerabilities/tests/test_msr2019.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,141 @@
# Copyright (c) nexB Inc. and others. All rights reserved.
# http://nexb.com and https://github.com/nexB/vulnerablecode/
# The VulnerableCode software is licensed under the Apache License version 2.0.
# Data generated with VulnerableCode require an acknowledgment.
#
# You may not use this software except in compliance with the License.
# You may obtain a copy of the License at: http://apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software distributed
# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
# CONDITIONS OF ANY KIND, either express or implied. See the License for the
# specific language governing permissions and limitations under the License.
#
# When you publish or redistribute any data created with VulnerableCode or any VulnerableCode
# derivative work, you must accompany this data with the following acknowledgment:
#
# Generated with VulnerableCode and provided on an "AS IS" BASIS, WITHOUT WARRANTIES
# OR CONDITIONS OF ANY KIND, either express or implied. No content created from
# VulnerableCode should be considered or used as legal advice. Consult an Attorney
# for any legal advice.
# VulnerableCode is a free software tool from nexB Inc. and others.
# Visit https://github.com/nexB/vulnerablecode/ for support and download.

import csv
import os
from unittest import TestCase
from unittest.mock import patch

from packageurl import PackageURL

from vulnerabilities.data_source import Advisory
from vulnerabilities.data_source import Reference
from vulnerabilities.importers import ProjectKBMSRDataSource


BASE_DIR = os.path.dirname(os.path.abspath(__file__))
TEST_DATA = os.path.join(BASE_DIR, "test_data/kbmsr2019", "test_msr_data.csv")


class TestProjectKBMSRDataSource(TestCase):
def test_to_advisories(self):
with open(TEST_DATA) as f:
lines = [l for l in f.readlines()]
test_data = csv.reader(lines)

found_advisories = ProjectKBMSRDataSource.to_advisories(test_data)
found_advisories = list(map(Advisory.normalized, found_advisories))
expected_advisories = [
Advisory(
summary="",
vulnerability_id="CVE-2018-11040",
impacted_package_urls=set(),
resolved_package_urls=set(),
references=[
Reference(
reference_id="",
url="https://github.com/spring-projects/spring-framework/commit/874859493bbda59739c38c7e52eb3625f247b93",
severities=[],
)
],
),
Advisory(
summary="",
vulnerability_id="CVE-2013-6408",
impacted_package_urls=set(),
resolved_package_urls=set(),
references=[
Reference(
reference_id="",
url="https://github.com/apache/lucene-solr/commit/7239a57a51ea0f4d05dd330ce5e15e4f72f72747",
severities=[],
)
],
),
Advisory(
summary="",
vulnerability_id="CVE-2015-6748",
impacted_package_urls=set(),
resolved_package_urls=set(),
references=[
Reference(
reference_id="",
url="https://github.com/jhy/jsoup/commit/4edb78991f8d0bf87dafde5e01ccd8922065c9b2",
severities=[],
)
],
),
Advisory(
summary="",
vulnerability_id="CVE-2018-14658",
impacted_package_urls=set(),
resolved_package_urls=set(),
references=[
Reference(
reference_id="",
url="https://github.com/keycloak/keycloak/commit/a957e118e6efb35fe7ef3a62acd66341a6523cb7",
severities=[],
)
],
),
Advisory(
summary="",
vulnerability_id="CVE-2017-1000355",
impacted_package_urls=set(),
resolved_package_urls=set(),
references=[
Reference(
reference_id="",
url="https://github.com/jenkinsci/jenkins/commit/701ea95a52afe53bee28f76a3f96eb0e578852e9",
severities=[],
)
],
),
Advisory(
summary="",
vulnerability_id="CVE-2018-1000844",
impacted_package_urls=set(),
resolved_package_urls=set(),
references=[
Reference(
reference_id="",
url="https://github.com/square/retrofit/commit/97057aaae42e54bfbee8acfa8af7dcf37e812342",
severities=[],
)
],
),
Advisory(
summary="",
vulnerability_id="",
impacted_package_urls=set(),
resolved_package_urls=set(),
references=[
Reference(
reference_id="HTTPCLIENT-1803",
url="https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b22",
severities=[],
)
],
),
]

assert expected_advisories == found_advisories
1 change: 0 additions & 1 deletion vulnerabilities/tests/test_nginx.py
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,6 @@
from vulnerabilities.importers.nginx import NginxDataSource
from vulnerabilities.package_managers import GitHubTagsAPI

#

BASE_DIR = os.path.dirname(os.path.abspath(__file__))
TEST_DATA = os.path.join(BASE_DIR, "test_data/nginx", "security_advisories.html")
Expand Down