Skip to content

Commit 44dcfbc

Browse files
committed
fix sarifs
1 parent 2910120 commit 44dcfbc

File tree

2 files changed

+6
-33
lines changed

2 files changed

+6
-33
lines changed

plugins/tools/dartanalyzer/test/expected.sarif

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json",
2+
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json",
33
"runs": [
44
{
55
"results": [
@@ -8,7 +8,7 @@
88
{
99
"physicalLocation": {
1010
"artifactLocation": {
11-
"uri": "/plugins/tools/dartanalyzer/test/src/Test.dart"
11+
"uri": "plugins/tools/dartanalyzer/test/src/Test.dart"
1212
},
1313
"region": {
1414
"startLine": 2
@@ -26,7 +26,7 @@
2626
{
2727
"physicalLocation": {
2828
"artifactLocation": {
29-
"uri": "/plugins/tools/dartanalyzer/test/src/Test.dart"
29+
"uri": "plugins/tools/dartanalyzer/test/src/Test.dart"
3030
},
3131
"region": {
3232
"startLine": 28
@@ -42,7 +42,8 @@
4242
],
4343
"tool": {
4444
"driver": {
45-
"name": "dartanalyzer"
45+
"name": "dartanalyzer",
46+
"rules": null
4647
}
4748
}
4849
}

plugins/tools/trivy/test/expected.sarif

Lines changed: 1 addition & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -8,35 +8,7 @@
88
"fullName": "Trivy Vulnerability Scanner",
99
"informationUri": "https://github.com/aquasecurity/trivy",
1010
"name": "Trivy",
11-
"rules": [
12-
{
13-
"id": "CVE-2024-21538",
14-
"name": "LanguageSpecificPackageVulnerability",
15-
"shortDescription": {
16-
"text": "cross-spawn: regular expression denial of service"
17-
},
18-
"fullDescription": {
19-
"text": "Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string."
20-
},
21-
"defaultConfiguration": {
22-
"level": "error"
23-
},
24-
"helpUri": "https://avd.aquasec.com/nvd/cve-2024-21538",
25-
"help": {
26-
"text": "Vulnerability CVE-2024-21538\nSeverity: HIGH\nPackage: cross-spawn\nFixed Version: 7.0.5, 6.0.6\nLink: [CVE-2024-21538](https://avd.aquasec.com/nvd/cve-2024-21538)\nVersions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.",
27-
"markdown": "**Vulnerability CVE-2024-21538**\n| Severity | Package | Fixed Version | Link |\n| --- | --- | --- | --- |\n|HIGH|cross-spawn|7.0.5, 6.0.6|[CVE-2024-21538](https://avd.aquasec.com/nvd/cve-2024-21538)|\n\nVersions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string."
28-
},
29-
"properties": {
30-
"precision": "very-high",
31-
"security-severity": "7.5",
32-
"tags": [
33-
"vulnerability",
34-
"security",
35-
"HIGH"
36-
]
37-
}
38-
}
39-
],
11+
"rules": null,
4012
"version": "0.59.1"
4113
}
4214
},

0 commit comments

Comments
 (0)