-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Burp Enterprise: Support newer format #11220
Conversation
DryRun Security SummaryThe provided code changes focus on enhancing the integration and parsing of Burp Enterprise scan reports in the OWASP Dependency-Track application, including updates to configuration files, vulnerability URL generation, and the BurpEnterpriseParser class, as well as the introduction of new unit tests to ensure the continued integrity and security of the application. Expand for full summarySummary: The provided code changes cover various updates and improvements to the OWASP Dependency-Track application, with a focus on enhancing the integration and parsing of Burp Enterprise scan reports. The changes include updates to configuration files, vulnerability URL generation, and the BurpEnterpriseParser class. From an application security perspective, the key changes are:
Overall, these changes focus on improving the security and reliability of the OWASP Dependency-Track application, particularly in the area of integrating and analyzing Burp Enterprise scan reports. The updates to the vulnerability source URLs, URL generation, and the BurpEnterpriseParser class are positive security enhancements, while the expanded unit tests help ensure the continued integrity and security of the application. Files Changed:
Code AnalysisWe ran Riskiness🟢 Risk threshold not exceeded. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved
Hi @Maffooch I see in this refactor the commonly "dedupe within parser" was left out. Is this the new approach, leave it to the post-save deduplication? That would make sense to me to reduce complexity and chance of inconsistency I see hashcode fields were not changed and continue to NOT include Should it be like that? |
Hi @fopinappb thanks for the questions! The decision to dedupe within the parser or not is often a nuanced internal discussion. I have found that it is entirely dependent on how the report is structured. With Burp Enterprise specifically, the reports are structured with the title of a finding, and then all endpoints underneath it to reflect the many instances of a given vulnerability. The changes made in this PR still do the dedupe within the parser, but it is not done in the same way as many other parsers. This is due to the table of contents at the beginning of a burp enterprise report. This table of contents is the best place to determine what endpoints are set on a give vulnerability. The parser works by first scraping the table of contents, and aggregating results there based on finding title. Once that is complete, more details about the vulnerability itself are added to the aggregated value later on in the create_findings function
Do you have an example of a report with query parameters that can be used to determine how to proceed? I would imagine the table of contents on the report would list paths with different query parameters as unique items, but that may not be the case |
Thanks for taking the time to comment @Maffooch I think my main question/misunderstanding is probably addressed in the other issue I opened for burp parser too, so I'll continue there for focusing! |
[sc-8300]