-
Notifications
You must be signed in to change notification settings - Fork 35
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
6 changed files
with
161 additions
and
178 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
140 changes: 140 additions & 0 deletions
140
src/test/resources/sourceCode/applicable_kind_pass_output.sarif
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,140 @@ | ||
{ | ||
"runs": [ | ||
{ | ||
"tool": { | ||
"driver": { | ||
"name": "JFrog Applicability Scanner", | ||
"rules": [ | ||
{ | ||
"id": "applic_CVE-2022-25878", | ||
"properties": { | ||
"conclusion": "positive", | ||
"applicability": "not_applicable" | ||
}, | ||
"fullDescription": { | ||
"text": "The scanner checks whether the vulnerable function `pem.Decode` is called.", | ||
"markdown": "The scanner checks whether the vulnerable function `pem.Decode` is called." | ||
}, | ||
"shortDescription": { | ||
"text": "Scanner for CVE-2020-28502" | ||
} | ||
}, | ||
{ | ||
"id": "CVE-2022-25978", | ||
"properties": { | ||
"conclusion": "negative", | ||
"applicability": "applicable" | ||
}, | ||
"fullDescription": { | ||
"text": "The scanner checks whether the vulnerable function `org.apache.xmlbeans.XmlObject.Factory.parse` is called or an interface that extends `org.apache.xmlbeans.XmlObject` is used.", | ||
"markdown": "The scanner checks whether the vulnerable function `org.apache.xmlbeans.XmlObject.Factory.parse` is called or an interface that extends `org.apache.xmlbeans.XmlObject` is used." | ||
}, | ||
"shortDescription": { | ||
"text": "Scanner for CVE-2020-5310" | ||
} | ||
}, | ||
{ | ||
"id": "applic_CVE-2021-25878", | ||
"fullDescription": { | ||
"text": "The scanner checks whether the vulnerable function `pem.Decode` is called.", | ||
"markdown": "The scanner checks whether the vulnerable function `pem.Decode` is called." | ||
}, | ||
"shortDescription": { | ||
"text": "Scanner for CVE-2020-28502" | ||
} | ||
}, | ||
{ | ||
"id": "applic_CVE-2022-29019", | ||
"fullDescription": { | ||
"text": "The scanner checks whether the vulnerable function `org.apache.xmlbeans.XmlObject.Factory.parse` is called or an interface that extends `org.apache.xmlbeans.XmlObject` is used.", | ||
"markdown": "The scanner checks whether the vulnerable function `org.apache.xmlbeans.XmlObject.Factory.parse` is called or an interface that extends `org.apache.xmlbeans.XmlObject` is used." | ||
}, | ||
"shortDescription": { | ||
"text": "Scanner for CVE-2020-5310" | ||
} | ||
} | ||
|
||
], | ||
"version": "APPLIC_SCANNERv0.2.0" | ||
} | ||
}, | ||
"invocations": [ | ||
{ | ||
"executionSuccessful": true, | ||
"arguments": [ | ||
"scan" | ||
], | ||
"workingDirectory": { | ||
"uri": "" | ||
} | ||
} | ||
], | ||
"results": [ | ||
{ | ||
"message": { | ||
"text": "The vulnerable function protobufjs.load is called" | ||
}, | ||
"locations": [ | ||
{ | ||
"physicalLocation": { | ||
"artifactLocation": { | ||
"uri": "file:///examples/applic-demo/index.js" | ||
}, | ||
"region": { | ||
"endColumn": 17, | ||
"endLine": 20, | ||
"snippet": { | ||
"text": "protobuf.parse(p)" | ||
}, | ||
"startColumn": 0, | ||
"startLine": 20 | ||
} | ||
} | ||
} | ||
], | ||
"ruleId": "applic_CVE-2022-25878" | ||
}, | ||
{ | ||
"message": { | ||
"text": "The vulnerable function protobufjs.parse is called." | ||
}, | ||
"locations": [ | ||
{ | ||
"physicalLocation": { | ||
"artifactLocation": { | ||
"uri": "file:///examples/applic-demo/index.js" | ||
}, | ||
"region": { | ||
"endColumn": 73, | ||
"endLine": 22, | ||
"snippet": { | ||
"text": "protobuf.load(\"/path/to/untrusted.proto\", function(err, root) { return })" | ||
}, | ||
"startColumn": 0, | ||
"startLine": 18 | ||
} | ||
} | ||
} | ||
], | ||
"ruleId": "CVE-2022-25978" | ||
}, | ||
{ | ||
"message": { | ||
"text": "The scanner checks whether the vulnerable function `ansi-regex` is called." | ||
}, | ||
"kind": "pass", | ||
"ruleId": "applic_CVE-2021-25878" | ||
}, | ||
{ | ||
"message": { | ||
"text": "The scanner checks whether the vulnerable function `ansi-regex` is called." | ||
}, | ||
"kind": "pass", | ||
"ruleId": "applic_CVE-2022-29019" | ||
} | ||
] | ||
} | ||
], | ||
"version": "2.1.0", | ||
"$schema": "https://docs.oasis-open.org/sarif/sarif/v2.1.0/cos02/schemas/sarif-schema-2.1.0.json" | ||
} |
165 changes: 0 additions & 165 deletions
165
src/test/resources/sourceCode/not_applic_kind_pass.sarif
This file was deleted.
Oops, something went wrong.