Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OSS vulnerability enrichment #137

Closed
JafarAkhondali opened this issue Nov 28, 2024 · 3 comments
Closed

OSS vulnerability enrichment #137

JafarAkhondali opened this issue Nov 28, 2024 · 3 comments
Labels
feature Something that's nice to have out of scope This issue is out of scope for this project

Comments

@JafarAkhondali
Copy link

JafarAkhondali commented Nov 28, 2024

First of all, thanks for this great project 👍🏻
"We want to hear from you," so I'd like to ask about a new feature. Do you plan to improve vulnerability reports for OSS? For example, it would be nice to know what open-source project is related to the CVE (apart from CPE as the relation is indirect) + a reference with a tag that shows which commit introduced the vulnerability, and which commit fixed this vulnerability. Such data would be a huge help for ML models in finding and fixing new vulnerabilities.
Disclaimer: I worked on a research for fix commits, and I can share it if it's useful (the link is not here to prevent self-promotion)

@CSMurray-CISA CSMurray-CISA added the feature Something that's nice to have label Nov 29, 2024
@amanion-cisa
Copy link
Collaborator

Hello and thanks for the feedback. While I agree that identifying upstream open source components and cause/fix commits would be very helpful, that information is rarely available in the information we have access to when analyzing reports. And researching that information manually is expensive. So, probably out of scope for the current vulnrichment project.

Does your research automate the discovery of fix commits? This I assume? https://github.com/JafarAkhondali/Morefixes

There are discussions underway in the CVE ecosystem about how to capture and convey what I'll call "VEX-like" information: how software is affected (or not) by a vulnerability in an upstream component. If this progresses, vulnrichment might integrate VEX/upstream information in some way.

@JafarAkhondali
Copy link
Author

Yes, that's the research. Thanks for the information! I understand. By the way, are you planning to add a link to the "POC" or "POCs" as well instead of only saying "exploitation" in SSVC ?

@todb-cisa todb-cisa added the out of scope This issue is out of scope for this project label Dec 11, 2024
@todb-cisa
Copy link
Collaborator

Agreed that it's great feedback, but I do believe this is out of scope for the CISA-ADP, since we're pretty restricted (self-imposed and by the CVE board, jointly) on what we can add to our ADP container. That said, we can keep this open for another few days for more discussion.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Something that's nice to have out of scope This issue is out of scope for this project
Projects
None yet
Development

No branches or pull requests

4 participants