From ab02950f602d0138c655ea0cf8714438a3a09abe Mon Sep 17 00:00:00 2001 From: Manuel Sommer Date: Sat, 16 Nov 2024 21:49:52 +0100 Subject: [PATCH] :tada: Add GLSA vulnid --- dojo/settings/.settings.dist.py.sha256sum | 2 +- dojo/settings/settings.dist.py | 2 +- dojo/templatetags/display_tags.py | 2 ++ 3 files changed, 4 insertions(+), 2 deletions(-) diff --git a/dojo/settings/.settings.dist.py.sha256sum b/dojo/settings/.settings.dist.py.sha256sum index 93d59b7193..238b4dc329 100644 --- a/dojo/settings/.settings.dist.py.sha256sum +++ b/dojo/settings/.settings.dist.py.sha256sum @@ -1 +1 @@ -86b642a2b79036697775cec20805c9ed3be3b18cf957a05c1fcf264cc35d4370 +1f06a2609a6971f9179325376a1345c194c978e0bfe15bad79d7673bec8959a0 diff --git a/dojo/settings/settings.dist.py b/dojo/settings/settings.dist.py index faedae4ac8..0af359abf1 100644 --- a/dojo/settings/settings.dist.py +++ b/dojo/settings/settings.dist.py @@ -1753,7 +1753,7 @@ def saml2_attrib_map_format(dict): "CAPEC": "https://capec.mitre.org/data/definitions/&&.html", # e.g. https://capec.mitre.org/data/definitions/157.html "CWE": "https://cwe.mitre.org/data/definitions/&&.html", # e.g. https://cwe.mitre.org/data/definitions/79.html "TEMP": "https://security-tracker.debian.org/tracker/", # e.g. https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF - "GLSA": "https://security.gentoo.org/", #e.g. https://security.gentoo.org/glsa/202409-32 + "GLSA": "https://security.gentoo.org/", # e.g. https://security.gentoo.org/glsa/202409-32 } # List of acceptable file types that can be uploaded to a given object via arbitrary file upload FILE_UPLOAD_TYPES = env("DD_FILE_UPLOAD_TYPES") diff --git a/dojo/templatetags/display_tags.py b/dojo/templatetags/display_tags.py index 3fa030d90a..1af8c90506 100644 --- a/dojo/templatetags/display_tags.py +++ b/dojo/templatetags/display_tags.py @@ -780,6 +780,8 @@ def vulnerability_url(vulnerability_id): for key in settings.VULNERABILITY_URLS: if vulnerability_id.upper().startswith(key): + if key == "GLSA": + return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace("GLSA-", "glsa/")) if "&&" in settings.VULNERABILITY_URLS[key]: # Process specific keys specially if need if key in ["CAPEC", "CWE"]: