-
Notifications
You must be signed in to change notification settings - Fork 35
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
179 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
165 changes: 165 additions & 0 deletions
165
src/test/resources/sourceCode/not_applic_kind_pass.sarif
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,165 @@ | ||
{ | ||
"runs": [ | ||
{ | ||
"tool": { | ||
"driver": { | ||
"name": "JFrog Applicability Scanner", | ||
"rules": [ | ||
{ | ||
"id": "applic_CVE-2021-3807", | ||
"fullDescription": { | ||
"text": "The scanner checks whether the vulnerable function `ansi-regex` is called.", | ||
"markdown": "The scanner checks whether the vulnerable function `ansi-regex` is called." | ||
}, | ||
"name": "CVE-2021-3807", | ||
"shortDescription": { | ||
"text": "Scanner for CVE-2021-3807" | ||
}, | ||
"properties": { | ||
"applicability": "not_applicable", | ||
"conclusion": "positive", | ||
"security-severity": "6.9" | ||
} | ||
}, | ||
{ | ||
"id": "applic_CVE-2021-3918", | ||
"fullDescription": { | ||
"text": "The scanner checks whether any of the following vulnerable functions are called:\n\n* `util.setProperty` with external input to its 2nd (`path`) or 3rd (`value`) arguments.\n* `ReflectionObject.setParsedOption` with external input to its 2nd (`name`) or 3rd (`value`) arguments.\n* `parse` with external input to its 1st (`source`) argument.\n* `load`\n* `loadSync`\n\nThe scanner also checks whether the `Object.freeze()` remediation is not present.", | ||
"markdown": "The scanner checks whether any of the following vulnerable functions are called:\n\n* `util.setProperty` with external input to its 2nd (`path`) or 3rd (`value`) arguments.\n* `ReflectionObject.setParsedOption` with external input to its 2nd (`name`) or 3rd (`value`) arguments.\n* `parse` with external input to its 1st (`source`) argument.\n* `load`\n* `loadSync`\n\nThe scanner also checks whether the `Object.freeze()` remediation is not present." | ||
}, | ||
"name": "CVE-2021-3918", | ||
"shortDescription": { | ||
"text": "Scanner for CVE-2021-3918" | ||
}, | ||
"properties": { | ||
"applicability": "not_applicable", | ||
"conclusion": "positive", | ||
"security-severity": "6.9" | ||
} | ||
}, | ||
{ | ||
"id": "applic_CVE-2022-25878", | ||
"name": "CVE-2022-25878", | ||
"shortDescription": { | ||
"text": "Scanner for CVE-2022-25878" | ||
}, | ||
"fullDescription": { | ||
"text": "The scanner checks whether any of the following vulnerable functions are called:\n\n* `util.setProperty` with external input to its 2nd (`path`) or 3rd (`value`) arguments.\n* `ReflectionObject.setParsedOption` with external input to its 2nd (`name`) or 3rd (`value`) arguments.\n* `parse` with external input to its 1st (`source`) argument.\n* `load`\n* `loadSync`\n\nThe scanner also checks whether the `Object.freeze()` remediation is not present.", | ||
"markdown": "The scanner checks whether any of the following vulnerable functions are called:\n\n* `util.setProperty` with external input to its 2nd (`path`) or 3rd (`value`) arguments.\n* `ReflectionObject.setParsedOption` with external input to its 2nd (`name`) or 3rd (`value`) arguments.\n* `parse` with external input to its 1st (`source`) argument.\n* `load`\n* `loadSync`\n\nThe scanner also checks whether the `Object.freeze()` remediation is not present." | ||
}, | ||
"properties": { | ||
"applicability": "applicable", | ||
"conclusion": "positive", | ||
"security-severity": "6.9" | ||
} | ||
} | ||
], | ||
"version": "APPLIC_SCANNERv0.2.3" | ||
} | ||
}, | ||
"invocations": [ | ||
{ | ||
"executionSuccessful": true, | ||
"arguments": [ | ||
"ca_scanner/applicability_scanner", | ||
"scan", | ||
"aplic_config.yaml" | ||
], | ||
"workingDirectory": { | ||
"uri": "file:///Users/user/.jfrog-vscode-extension/issues/analyzerManager" | ||
} | ||
} | ||
], | ||
"results": [ | ||
{ | ||
"message": { | ||
"text": "Prototype pollution `Object.freeze` remediation was not detected, The vulnerable function protobufjs.parse is called with external input, The vulnerable function protobufjs.load(Sync) is called" | ||
}, | ||
"locations": [ | ||
{ | ||
"physicalLocation": { | ||
"artifactLocation": { | ||
"uri": "file:///examples/applic-demo/../applic-demo/index.js" | ||
}, | ||
"region": { | ||
"endColumn": 18, | ||
"endLine": 21, | ||
"snippet": { | ||
"text": "protobuf.parse(p)" | ||
}, | ||
"startColumn": 1, | ||
"startLine": 21 | ||
} | ||
} | ||
} | ||
], | ||
"ruleId": "applic_CVE-2022-25878" | ||
}, | ||
{ | ||
"message": { | ||
"text": "Prototype pollution `Object.freeze` remediation was not detected, The vulnerable function protobufjs.parse is called with external input, The vulnerable function protobufjs.load(Sync) is called" | ||
}, | ||
"locations": [ | ||
{ | ||
"physicalLocation": { | ||
"artifactLocation": { | ||
"uri": "file:///examples/applic-demo/../applic-demo/index.js" | ||
}, | ||
"region": { | ||
"endColumn": 74, | ||
"endLine": 23, | ||
"snippet": { | ||
"text": "protobuf.load(\"/path/to/untrusted.proto\", function(err, root) { return })" | ||
}, | ||
"startColumn": 1, | ||
"startLine": 23 | ||
} | ||
} | ||
} | ||
], | ||
"ruleId": "applic_CVE-2022-25878" | ||
}, | ||
{ | ||
"message": { | ||
"text": "Some remediation for not applicable issue." | ||
}, | ||
"locations": [ | ||
{ | ||
"physicalLocation": { | ||
"artifactLocation": { | ||
"uri": "file:///examples/applic-demo/../applic-demo/index.js" | ||
}, | ||
"region": { | ||
"endColumn": 1, | ||
"endLine": 23, | ||
"snippet": { | ||
"text": "protobuf.load(\"/path/to/untrusted.proto\", function(err, root) { return })" | ||
}, | ||
"startColumn": 1, | ||
"startLine": 1 | ||
} | ||
} | ||
} | ||
], | ||
"ruleId": "applic_CVE-2021-3807" | ||
}, | ||
{ | ||
"message": { | ||
"text": "The scanner checks whether the vulnerable function `ansi-regex` is called." | ||
}, | ||
"kind": "pass", | ||
"ruleId": "applic_CVE-2021-3807" | ||
}, | ||
{ | ||
"message": { | ||
"text": "The scanner checks whether any of the following vulnerable functions are called:\n\n* `json-schema.validate` with external input to its 1st (`instance`) argument.\n* `json-schema.checkPropertyChange` with external input to its 2nd (`schema`) argument." | ||
}, | ||
"kind": "pass", | ||
"ruleId": "applic_CVE-2021-3918" | ||
} | ||
] | ||
} | ||
], | ||
"version": "2.1.0", | ||
"$schema": "https://docs.oasis-open.org/sarif/sarif/v2.1.0/cos02/schemas/sarif-schema-2.1.0.json" | ||
} |