
net.ossindex.common.resource.VulnerabilityResource Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of ossindex-api Show documentation
Show all versions of ossindex-api Show documentation
OSS Index REST API access library
/**
* Copyright (c) 2015 Vör Security Inc.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* * Neither the name of the nor the
* names of its contributors may be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL BE LIABLE FOR ANY
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
package net.ossindex.common.resource;
import java.net.URI;
import java.net.URISyntaxException;
import net.ossindex.version.IVersionRange;
import net.ossindex.version.VersionFactory;
/** Representation of a Vulnerability, backed by the OSS Index REST API.
*
* Vulnerabilities come in 3 flavours
*
* 1. As a search result -- external link (/v1.0/scm/299024085/vulnerabilities).
* An 'external link' vulnerability is a vulnerability that has been added,
* likely manually, which is comprised simply of a link to an external site
* describing a vulnerability, and the versions affected. The versions are
* related to the unique SCM/artifact that references this vulnerability
* instance. Note that a vulnerability *may* affect multiple products, but
* the version field is related to the SCM/Aftifact being queries for.
* [
* {
* "uri": "https://nodesecurity.io/advisories/uglifyjs_incorrectly_handles_non-boolean_comparisons",
* "versions": [
* "<= 2.4.23"
* ]
* }
* ]
*
* 2. As a search result -- CVE (/v1.0/scm/296375846/vulnerabilities).
* These are vulnerabilities found in the National Vulnerability Database(NVD).
* The versions are
* related to the unique SCM/artifact that references this vulnerability
* instance. Note that a vulnerability *may* affect multiple products, but
* the version field is related to the SCM/Aftifact being queries for.
*
* [
* {
* "uri": "cve:/CVE-2011-4969",
* "id": "348528",
* "cve-id": "CVE-2011-4969",
* "summary": "Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.",
* "details": "http://localhost:8080/v1.0/cve/348528",
* "versions": [
* "1.6",
* "1.6.1",
* "1.6.2"
* ]
* },
* ...
* ]
*
* 3. Full CVE details (/v1.0/cve/323345)
* Note that in this case there is no version field in the same sense as the
* ones as a result of search, since when searching there is a single product
* for which we are returning versions, whereas when CVE details are retrieved
* they may be affecting multiple versions.
*
* @author Ken Duck
*
*/
public class VulnerabilityResource extends AbstractRemoteResource
{
//--------------------------------------------------------------------
// External link vulnerability result
//--------------------------------------------------------------------
// Nothing unique here. Everything is represented in 'common' fields, below.
//--------------------------------------------------------------------
// CVE details only. Full CVE details include this, CVE Common, and Common fields
//--------------------------------------------------------------------
private String complexity;
private String vector;
private String authentication;
private String availability;
private String confidentiality;
private String integrity;
private String source;
private String security_protection;
private Long discovered;
private Long generated;
private Long published;
private Long modified;
// FIXME: Not handled: CPEs
// FIXME: Not handled: CWEs
//--------------------------------------------------------------------
// CVE Common (Search and Details)
//--------------------------------------------------------------------
// When doing a search that returns CVEs, these and common are returned
private String cveId;
//--------------------------------------------------------------------
// Common to every vulnerability type
//--------------------------------------------------------------------
private String uri;
private String title;
private String summary;
private String details;
// Note that in this case there is no version field in the same sense as the
// ones as a result of search, since when searching there is a single product
// for which we are returning versions, whereas when CVE details are retrieved
// they may be affecting multiple versions.
private String[] versions;
/*
* (non-Javadoc)
* @see net.ossindex.common.resource.AbstractRemoteResource#getResourceType()
*/
@Override
protected String getResourceType()
{
return "vulnerability";
}
/** Return true if this vulnerability represents a known CVE. Otherwise this
* is likely an 'external link'.
*
* @return true if this is a CVE
*/
public boolean isCve()
{
return getId() > 0;
}
/** Get the unique URI for a vulnerability
*
* @return The vulnerability URI
*/
public URI getUri()
{
if(uri != null)
{
try
{
return new URI(uri);
}
catch (URISyntaxException e)
{
e.printStackTrace();
}
}
return null;
}
/** Get the product version ranges affected by this vulnerability. This will only
* be filled in if this vulnerability is the result of a search which allows us
* to identify the explicit project we are interested in.
*
* @return The list of version ranges that the vulnerability affects
*/
public String[] getVersions()
{
return versions;
}
/** Get a reasonable description of the vulnerability
*
* @return A description
*/
public String getDescription()
{
if(summary != null) return summary;
return uri.toString();
}
/** Get a reasonable title of the vulnerability
*
* @return A title
*/
public String getTitle()
{
if(title != null) return title;
return uri.toString();
}
/** Return true if this vulnerability affects anything within the provided range
*
* @param name product/package name
* @param range range of versions that the passed in product/package represents
* @return True if the vulnerability affects the specified product/package
*/
public boolean affects(String name, String range)
{
return appliesTo(range);
}
/** Return true if this vulnerability affects anything within the provided range
*
* @param range range of versions that the passed in product/package represents
* @return True if the vulnerability affects the specified product/package
*/
public boolean appliesTo(String range)
{
if(versions != null)
{
// We do this in two stages, since some of this code is going
// to be moved to the SemanticVersion itself and this is
// a work-around implementation.
IVersionRange[] ranges = new IVersionRange[versions.length];
for(int i = 0; i < versions.length; i++)
{
ranges[i] = VersionFactory.getRange(versions[i]);
}
IVersionRange yourRange = VersionFactory.getRange(range);
for(int i = 0; i < ranges.length; i++)
{
if(ranges[i].intersects(yourRange)) return true;
}
}
return false;
}
// /** Return true if this vulnerability applies to the specified version.
// *
// * @param version Version we are checking
// * @return true if the vulnerability affects the resource
// */
// public boolean appliesTo(String version)
// {
// IVersion suppliedVersion = VersionFactory.getVersionFactory().getVersion(version);
// for(String v: versions)
// {
// IVersion hv = VersionFactory.getVersionFactory().getVersion(v);
// if(hv.satisfies(version))
// {
// return true;
// }
//
// if(suppliedVersion != null && suppliedVersion.satisfies(v))
// {
// // Due to limitations of how CVE version numbers are applied we need to do
// // some extra sanity before allowing this match.
// //
// // FIXME: Really this code should be part of an improved "satisfies" method,
// // but this will suffice for now.
// boolean filter = false;
// if(!version.equals(v))
// {
// // First filter, when the version is a subset of the other version
// // it is not a match (if there is a wild card then it will not trip
// // the filter.)
// if(version.startsWith(v)) filter = true;
// }
// if(!filter) return true;
// }
// }
// return false;
// }
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy