Skip to content

Commit 8d60898

Browse files
Added workarounds to vulnerability spec
Signed-off-by: Steve Springett <[email protected]>
1 parent f2b5cd6 commit 8d60898

File tree

6 files changed

+16
-4
lines changed

6 files changed

+16
-4
lines changed

schema/bom-1.5.proto

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -606,6 +606,8 @@ message Vulnerability {
606606
optional google.protobuf.Timestamp rejected = 19;
607607
// Evidence used to reproduce the vulnerability.
608608
optional ProofOfConcept proofOfConcept = 20;
609+
// A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.
610+
optional string workaround = 21;
609611
}
610612

611613
message ProofOfConcept {

schema/bom-1.5.schema.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1672,9 +1672,14 @@
16721672
},
16731673
"recommendation": {
16741674
"type": "string",
1675-
"title": "Details",
1675+
"title": "Recommendation",
16761676
"description": "Recommendations of how the vulnerability can be remediated or mitigated."
16771677
},
1678+
"workaround": {
1679+
"type": "string",
1680+
"title": "Workarounds",
1681+
"description": "A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments."
1682+
},
16781683
"proofOfConcept": {
16791684
"type": "object",
16801685
"title": "Proof of Concept",

schema/bom-1.5.xsd

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2102,6 +2102,11 @@ limitations under the License.
21022102
<xs:documentation>Recommendations of how the vulnerability can be remediated or mitigated.</xs:documentation>
21032103
</xs:annotation>
21042104
</xs:element>
2105+
<xs:element name="workaround" type="xs:string" minOccurs="0" maxOccurs="1">
2106+
<xs:annotation>
2107+
<xs:documentation>A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.</xs:documentation>
2108+
</xs:annotation>
2109+
</xs:element>
21052110
<xs:element name="proofOfConcept" minOccurs="0" maxOccurs="1">
21062111
<xs:complexType>
21072112
<xs:annotation>

tools/src/test/resources/1.5/valid-vulnerability-1.5.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@
5050
"description": "FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.",
5151
"detail": "",
5252
"recommendation": "Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.5, 2.8.11.1, 2.9.5 or higher.",
53+
"workaround": "Describe the workarounds here",
5354
"proofOfConcept": {
5455
"reproductionSteps": "Precise steps to reproduce go here",
5556
"environment": "Describe the environment",

tools/src/test/resources/1.5/valid-vulnerability-1.5.textproto

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,3 @@
1-
# proto-file: bom-1.5.proto
2-
# proto-message: Bom
3-
41
spec_version: "1.5"
52
version: 1
63
serial_number: "urn:uuid:3e671687-395b-41f5-a30f-a58921a69b79"
@@ -142,4 +139,5 @@ vulnerabilities {
142139
name: "Bar"
143140
value: "Foo"
144141
}
142+
workaround: "Describe the workarounds here"
145143
}

tools/src/test/resources/1.5/valid-vulnerability-1.5.xml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,7 @@
5151
<description>FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.</description>
5252
<detail></detail>
5353
<recommendation>Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.5, 2.8.11.1, 2.9.5 or higher.</recommendation>
54+
<workaround>Describe the workarounds here</workaround>
5455
<proofOfConcept>
5556
<reproductionSteps>Precise steps to reproduce go here</reproductionSteps>
5657
<environment>Describe the environment</environment>

0 commit comments

Comments
 (0)