Skip to content

Commit 12fa878

Browse files
committed
1 parent 0c7fb2e commit 12fa878

File tree

2 files changed

+127
-0
lines changed

2 files changed

+127
-0
lines changed

e2etests/testcase_test.go

+44
Original file line numberDiff line numberDiff line change
@@ -3213,4 +3213,48 @@ var testCases = []testCase{
32133213
},
32143214
},
32153215
},
3216+
{
3217+
image: "docker.io/stackrox/sandbox:springboot-web-cloud-function-2.6.6",
3218+
registry: "https://registry-1.docker.io",
3219+
username: os.Getenv("DOCKER_IO_PULL_USERNAME"),
3220+
password: os.Getenv("DOCKER_IO_PULL_PASSWORD"),
3221+
onlyCheckSpecifiedVulns: true,
3222+
source: "NVD",
3223+
namespace: "alpine:v3.15",
3224+
expectedFeatures: []apiV1.Feature{
3225+
{
3226+
Name: "spring-cloud-function-core",
3227+
VersionFormat: "JavaSourceType",
3228+
Version: "3.2.2",
3229+
Vulnerabilities: []apiV1.Vulnerability{
3230+
{
3231+
Name: "CVE-2022-22963",
3232+
Description: "In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.",
3233+
Link: "https://nvd.nist.gov/vuln/detail/CVE-2022-22963",
3234+
Severity: "Critical",
3235+
Metadata: map[string]interface{}{
3236+
"NVD": map[string]interface{}{
3237+
"CVSSv3": map[string]interface{}{
3238+
"ExploitabilityScore": 3.9,
3239+
"ImpactScore": 5.9,
3240+
"Score": 9.8,
3241+
"Vectors": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
3242+
},
3243+
"CVSSv2": map[string]interface{}{
3244+
"ExploitabilityScore": 0.0,
3245+
"ImpactScore": 0.0,
3246+
"Score": 0.0,
3247+
"Vectors": "",
3248+
},
3249+
},
3250+
},
3251+
FixedBy: "3.2.3",
3252+
},
3253+
},
3254+
AddedBy: "sha256:f26cc7bc44e4f9b8969a0a95040d484ab301b3e56d1fb1eda8a79bf7e089f24e",
3255+
Location: "app/demo-0.0.1-SNAPSHOT.war:WEB-INF/lib/spring-cloud-function-core-3.2.2.jar",
3256+
FixedBy: "3.2.3",
3257+
},
3258+
},
3259+
},
32163260
}

pkg/vulnloader/nvdloader/manual.go

+83
Original file line numberDiff line numberDiff line change
@@ -297,6 +297,89 @@ var manuallyEnrichedVulns = map[string]*schema.NVDCVEFeedJSON10DefCVEItem{
297297
LastModifiedDate: "2022-03-16T00:00Z",
298298
PublishedDate: "2022-03-16T00:00Z",
299299
},
300+
"CVE-2022-22963": {
301+
CVE: &schema.CVEJSON40{
302+
CVEDataMeta: &schema.CVEJSON40CVEDataMeta{
303+
ID: "CVE-2022-22963",
304+
},
305+
DataFormat: "MITRE",
306+
DataType: "CVE",
307+
DataVersion: "4.0",
308+
Description: &schema.CVEJSON40Description{
309+
DescriptionData: []*schema.CVEJSON40LangString{
310+
{
311+
Lang: "en",
312+
Value: `In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.`,
313+
},
314+
},
315+
},
316+
References: &schema.CVEJSON40References{
317+
ReferenceData: []*schema.CVEJSON40Reference{
318+
{
319+
Name: "https://tanzu.vmware.com/security/cve-2022-22963",
320+
},
321+
},
322+
},
323+
},
324+
Configurations: &schema.NVDCVEFeedJSON10DefConfigurations{
325+
CVEDataVersion: "4.0",
326+
Nodes: []*schema.NVDCVEFeedJSON10DefNode{
327+
{
328+
CPEMatch: []*schema.NVDCVEFeedJSON10DefCPEMatch{
329+
{
330+
Cpe23Uri: `cpe:2.3:a:apache:spring\-cloud\-function\-core:*:*:*:*:*:*:*:*`,
331+
VersionEndExcluding: "3.2.3",
332+
VersionStartIncluding: "3.2.0",
333+
},
334+
{
335+
Cpe23Uri: `cpe:2.3:a:apache:spring\-cloud\-function\-core:*:*:*:*:*:*:*:*`,
336+
VersionEndExcluding: "3.1.7",
337+
},
338+
{
339+
Cpe23Uri: `cpe:2.3:a:springframework:spring\-cloud\-function\-core:*:*:*:*:*:*:*:*`,
340+
VersionEndExcluding: "3.2.3",
341+
VersionStartIncluding: "3.2.0",
342+
},
343+
{
344+
Cpe23Uri: `cpe:2.3:a:springframework:spring\-cloud\-function\-core:*:*:*:*:*:*:*:*`,
345+
VersionEndExcluding: "3.1.7",
346+
},
347+
{
348+
Cpe23Uri: `cpe:2.3:a:pivotal:spring\-cloud\-function\-core:*:*:*:*:*:*:*:*`,
349+
VersionEndExcluding: "3.2.3",
350+
VersionStartIncluding: "3.2.0",
351+
},
352+
{
353+
Cpe23Uri: `cpe:2.3:a:pivotal:spring\-cloud\-function\-core:*:*:*:*:*:*:*:*`,
354+
VersionEndExcluding: "3.1.7",
355+
},
356+
},
357+
Operator: "OR",
358+
},
359+
},
360+
},
361+
Impact: &schema.NVDCVEFeedJSON10DefImpact{
362+
BaseMetricV3: &schema.NVDCVEFeedJSON10DefImpactBaseMetricV3{
363+
CVSSV3: &schema.CVSSV30{
364+
AttackComplexity: "LOW",
365+
AttackVector: "NETWORK",
366+
AvailabilityImpact: "HIGH",
367+
BaseScore: 9.8,
368+
ConfidentialityImpact: "HIGH",
369+
IntegrityImpact: "HIGH",
370+
PrivilegesRequired: "NONE",
371+
Scope: "UNCHANGED",
372+
UserInteraction: "NONE",
373+
VectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
374+
Version: "3.0",
375+
},
376+
ExploitabilityScore: 3.9,
377+
ImpactScore: 5.9,
378+
},
379+
},
380+
LastModifiedDate: "2022-03-31T00:00Z",
381+
PublishedDate: "2022-03-29T00:00Z",
382+
},
300383
"CVE-2022-22965": {
301384
CVE: &schema.CVEJSON40{
302385
CVEDataMeta: &schema.CVEJSON40CVEDataMeta{

0 commit comments

Comments
 (0)