Skip to content

Work With Result Vulnerabilities

Scott Behrens edited this page Oct 17, 2016 · 1 revision

Table of Contents

Overview

This section of the Getting Started guide will get you comfortable working with Vulnerabilities. This portion assumes you have already gone through the rest of the Getting Started tasks including setting up a security task.

What are Vulnerabilities?

In the context of Scumblr, a vulnerablity is a finding associated with a result that can be flagged either Observational (meaning it may not be a vulnerablity in itself) or Critical, High, Medium, Low, Informational.

Working with a Vulnerability

Earlier in this tutorial, we stepped through setting up a Curl security task to identify if the server is running Apache. For this tutorial, let's assume that upon further investigation this issue is more of a low risk finding instead of observational. Let's go ahead and make some changes to this vulnerability to reflect this.

Let's go ahead and run our Saved Filter from the previous tutorial. Click on the result (exp. www.scottbehrens.com) and expand out the Observation.

In the upper left corner of the finding, we can change it's status. Let's go ahead and update it to Low.

Marking a Finding as Remediated

For this example, let's pretend we have removed the server banner and the issue is now resolved. Many security analyzers (Github and Curl for example) will automatically detect when a vulnerablity is no longer present and flag the result as Auto-Remediated.

Since this is just an example, let's go ahead and update the status to remediated. You can do that by selecting the dropdown on the right of the vulnerability.

If you refresh the page you will see the vulnerability is no longer listed.

Vulnerability Filters

Vulnerability filters are a powerful tool to let you narrow down and filter out vulnerabilities. As you saw earlier, we updated our vulnerablity to be a low risk finding and we also flagged it as remediated. To show this remediated vulnerablity, you can filter based on the status Remediated as seen below:

Dealing with Regressions

To simulate a regression, let's go ahead and re-run our Curl task. Navigate to your Tasks page by clicking the link in the top banner. Select the checkbox next to the Curl Analyzer and click the Run button.

Navigate back to your Result and you should see the vulnerability is now reopened.

Vulnerability Deep Dive

This section contains a little more context on how to work with vulnerabilities.

Vulnerability Statuses

Vulnerabilities have 5 Status types enumerated below.

Remediated

You can mark a vulnerability Remediated once it has been resolved. If it is identified again it will be changaed to Reopened type.

False Positive

You can mark a vulnerability False Positive and it will be moved into a closed state. If it is identified again after 30 days, it will be changed to Reopened type.

Ignored

You can mark a vulnerability Ignored if you don't care about the issue or it's truly a false positive. Ignored vulnerabilities will never reopen.

Auto-Remediated

Certain security tasks can auto-remediate vulnerabilities (such as the Curl security task) if the issue is no longer present. Auto-Remediated issues will be moved into closed status.

Reopened

If an issue is found to have regressed, it will be moved into Reopened state.

Add Finding

You can manually add a finding by clicking the Add Finding button on a result. This can be useful for issue identified manually via code review, penetration tests, etc.

Associating Vulnerabilities with Jira Tickets

If you use Jira and have setup your Jiralicious file, you can associate a Jira ticket with your vulnerabilities. Simply specify a comma separated list of Jira ID's and click the Update button. Once the page is refreshed, they will be converted into links.

Clone this wiki locally