-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vulns: add curl and libcurl vulns #1275
Conversation
321a31e
to
f338fed
Compare
/retest |
Images are ready for the commit at f338fed. To use the images, use the tag |
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Do we need to remove these CVEs after OVAL feeds get updated?
pkg/vulnloader/nvdloader/manual.go
Outdated
Description: []*schema.CVEJSON40LangString{ | ||
{ | ||
Lang: "en", | ||
Value: "CWE-611", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Per curl.se this should be CWE-122
Heap-based Buffer Overflow
pkg/vulnloader/nvdloader/manual.go
Outdated
{ | ||
Cpe23Uri: `cpe:2.3:a:ubuntu:curl:*:*:*:*:*:*:*:*`, | ||
VersionEndExcluding: "8.4.0", | ||
Vulnerable: true, | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should add VersionStartIncluding: "7.69.0"
pkg/vulnloader/nvdloader/manual.go
Outdated
{ | ||
CPEMatch: []*schema.NVDCVEFeedJSON10DefCPEMatch{ | ||
{ | ||
Cpe23Uri: `cpe:2.3:a:ubuntu:curl:*:*:*:*:*:*:*:*`, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is the vendor ubuntu
in the CPE line here accurate? See other curl
vulns use haxx
as the vendor.
pkg/vulnloader/nvdloader/manual.go
Outdated
AttackComplexity: "LOW", | ||
AttackVector: "NETWORK", | ||
AvailabilityImpact: "HIGH", | ||
BaseScore: 7.5, | ||
BaseSeverity: "HIGH", | ||
ConfidentialityImpact: "HIGH", | ||
IntegrityImpact: "HIGH", | ||
PrivilegesRequired: "NONE", | ||
Scope: "UNCHANGED", | ||
UserInteraction: "REQUIRED", | ||
VectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", | ||
Version: "3.1", | ||
}, | ||
ExploitabilityScore: 1.6, | ||
ImpactScore: 5.9, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Assuming this was sourced from RH data?
Based on vector AC:H
, AttackComplexity
should be HIGH
pkg/vulnloader/nvdloader/manual.go
Outdated
Description: []*schema.CVEJSON40LangString{ | ||
{ | ||
Lang: "en", | ||
Value: "CWE-611", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Per curl.se - CWE-73
: External Control of File Name or Path
pkg/vulnloader/nvdloader/manual.go
Outdated
Name: "https://github.com/curl/curl/discussions/12026", | ||
Refsource: "MISC", | ||
Tags: []string{"Patch", "Third Party Advisory"}, | ||
URL: "https://github.com/curl/curl/discussions/12026", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should these links be https://curl.se/docs/CVE-2023-38546.html instead?
pkg/vulnloader/nvdloader/manual.go
Outdated
Name: "https://github.com/curl/curl/discussions/12026", | ||
Refsource: "MISC", | ||
Tags: []string{"Patch", "Third Party Advisory"}, | ||
URL: "https://github.com/curl/curl/discussions/12026", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should these links be https://curl.se/docs/CVE-2023-38545.html instead?
pkg/vulnloader/nvdloader/manual.go
Outdated
Cpe23Uri: `cpe:2.3:a:ubuntu:libcurl:*:*:*:*:*:*:*:*`, | ||
VersionEndExcluding: "8.4.0", | ||
Vulnerable: true, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should add VersionStartIncluding: "7.9.1"
I ran a genesis dump without these changes (see #1276). You'll notice in that PR in the genesis dump logs, you will find logs saying CVE-2023-38545 and CVE-2023-38546 are missing for several distributions. With this PR, they are no longer missing, as we utilize the CVSSv3 scores from our "NVD" manual entries.
Note: this does not affect Red Hat, as they track CVSS scores, themselves