quarkus: Quarkus is not known in the NVD Database CPE
Describe the bug Quarkus is not known in the NVD Database CPE (Common Platform Enumeration: https://nvd.nist.gov/products/cpe) Dictionary so when running the OWASP dependency check some false positive are found.
Expected behavior The NVD CPE directory should be aware of Quarkus.
Actual behavior When running the OWASP Maven depency check plugin, false positive are found around quarkus-postgres that is detected as the Postgres driver and not as quakus-postgres
quarkus-jdbc-postgresql-0.15.0.jar (pkg:maven/io.quarkus/quarkus-jdbc-postgresql@0.15.0, cpe:2.3:a:postgresql:postgresql:0.15.0:*:*:*:*:*:*:*) : CVE-2007-2138, CVE-2010-0733, CVE-2014-0060, CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, CVE-2014-0066, CVE-2014-0067, CVE-2015-3165, CVE-2015-5288, CVE-2015-5289, CVE-2016-0766, CVE-2016-0768, CVE-2016-0773, CVE-2016-5423, CVE-2016-5424, CVE-2016-7048, CVE-2017-14798, CVE-2017-7484, CVE-2018-1115
quarkus-jdbc-postgresql-0.15.0.jar is found as cpe:2.3🅰️postgresql:postgresql:0.15.0
For a workaround, I can add a CPE exclusion on the owasp dependency check plugin via an exclusion file in my pom.xml but the best will be to include Quarkus artifacts in the NVD database as propre CPE.
To Reproduce Steps to reproduce the behavior:
- Create an app with PostgresSQL
- Add the OWASP dependency check maven plugin
- mvn verify
Environment (please complete the following information):
- Quarkus version or git rev: 0.15.0
About this issue
- Original URL
- State: closed
- Created 5 years ago
- Reactions: 1
- Comments: 53 (44 by maintainers)
So I finally found the time to test it 😉 And it works, thanks @nhumblot for the great work on the dependency check plugin.
@sberyozkin with the new version of the plugin, I no longuer need the CPE detection exclusion for quarkus-security, quarkus-munity and quarkus-resteasy. Great!
@abianche quarkus is audited but I’ll try catch up why quarkus is not showing up in this type of audit here as I assume it is done for other products. stay tunes.
Can someone from the core Quarkus team can declare the Quarkus artifact inside the NVD database ? Here is the up-to-date suppression dependency file that I use:
@loicmathieu Hi Loic, sorry for a delay, thanks a million for verifying it, and for the help throughout this issue 😃 I’m going to close this issue again 😃 - but we will be reopening it if some new CVE will cause a plugin run failure etc. (I have another pending batch update to send)
@nhumblot thanks again for the plugin fix
Great! I’ll test it as soon à 6.2.0 will be out.
@loicmathieu Hi - I’m going to send a query to https://jeremylong.github.io/DependencyCheck/mailing-lists.html
@loicmathieu Request to register
quarkus-http
,quarkus-security
andgizmo
has been opened, will update once it has been resolved.@loicmathieu Hi Loic - so our instruction for re-opening this issue had to be activated fast 😃, thanks for checking it. Hmm… so, I will ask to open CPEs for some well-known Quarkus projects, starting from the 2 you mentioned, we’ll get there eventually I guess. thanks
@loicmathieu CPE team has helped with updating Quarkus CPEs against one of the resolved CVEs so now there is a clear path toward managing this issue, I’ll ask them to help with syncing CPEs with some other known CVEs and then resolve this issue - from then on we will be sending updates to NVD as needed - and we can also use this issue as a notifier, ex, when a new false positive is created - then we re-open it, etc
Now that Quarkus is listed on https://nvd.nist.gov/products/cpe/search/results?namingFormat=2.3&keyword=quarkus and CVE’s can be reported there by anyone in community (incl. red hat security) are there anything left on this issue or can we close it ?
Hi All, the process has started (most Quarkus releases have already been registered by the NVD CPE team) but other high-priority issues have intervened; we will resume the effort soon.
@lukaszlenart what you see is exactly the issue I described in this issue, except for Vert.x all these are false positive.
By adding Quarkus on the NVD database, quarkus-undertow would be detected as Quarkus and not Undertow and the issue disapear.
The dependency check plugin uses ‘CPE’ to, based on collected evidence (file name, maven artifactid/groupid), detected a dependency as known target on the vulnerability database, as long as Quarkus is not defined here, false positive will exist. No dependecy upgrade would correct this. You can add an exclusion file to workaround this issue.
@sberyozkin the OWASP plugin based it’s matching startegy on CPE (Common Platform Enumeration).
Here is the evidence it founds on
quarkus-resteasy
that leads to the cpe:redhat:resteasy:1.8.3, as soon as Quarkus CPE will be declared on the NVD Database it will leads to a Quarkus CPE instead of a resteasy ones so eliminates all false positive.@loicmathieu I’m going to look into it shortly, thanks