* feat(libscan): support gradle.lockfile * add gradle.lockfile to integration test * fix readme * chore: update integration * find *gradle.lockfile Co-authored-by: MaineK00n <mainek00n.1229@gmail.com>
		
			
				
	
	
		
			202 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			202 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
//go:build !scanner
 | 
						|
// +build !scanner
 | 
						|
 | 
						|
package detector
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"net/http"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/future-architect/vuls/errof"
 | 
						|
	"github.com/future-architect/vuls/models"
 | 
						|
	"golang.org/x/oauth2"
 | 
						|
)
 | 
						|
 | 
						|
// DetectGitHubSecurityAlerts access to owner/repo on GitHub and fetch security alerts of the repository via GitHub API v4 GraphQL and then set to the given ScanResult.
 | 
						|
// https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies/
 | 
						|
func DetectGitHubSecurityAlerts(r *models.ScanResult, owner, repo, token string, ignoreDismissed bool) (nCVEs int, err error) {
 | 
						|
	src := oauth2.StaticTokenSource(
 | 
						|
		&oauth2.Token{AccessToken: token},
 | 
						|
	)
 | 
						|
	//TODO Proxy
 | 
						|
	httpClient := oauth2.NewClient(context.Background(), src)
 | 
						|
 | 
						|
	// TODO Use `https://github.com/shurcooL/githubv4` if the tool supports vulnerabilityAlerts Endpoint
 | 
						|
	// Memo : https://developer.github.com/v4/explorer/
 | 
						|
	const jsonfmt = `{"query":
 | 
						|
	"query { repository(owner:\"%s\", name:\"%s\") { url vulnerabilityAlerts(first: %d, states:[OPEN], %s) { pageInfo { endCursor hasNextPage startCursor } edges { node { id dismissReason dismissedAt securityVulnerability{ package { name ecosystem } severity vulnerableVersionRange firstPatchedVersion { identifier } } securityAdvisory { description ghsaId permalink publishedAt summary updatedAt withdrawnAt origin severity references { url } identifiers { type value } } } } } } } "}`
 | 
						|
	after := ""
 | 
						|
 | 
						|
	for {
 | 
						|
		jsonStr := fmt.Sprintf(jsonfmt, owner, repo, 100, after)
 | 
						|
		ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
 | 
						|
		req, err := http.NewRequestWithContext(ctx, http.MethodPost,
 | 
						|
			"https://api.github.com/graphql",
 | 
						|
			bytes.NewBuffer([]byte(jsonStr)),
 | 
						|
		)
 | 
						|
		defer cancel()
 | 
						|
		if err != nil {
 | 
						|
			return 0, err
 | 
						|
		}
 | 
						|
 | 
						|
		// https://developer.github.com/v4/previews/#repository-vulnerability-alerts
 | 
						|
		// To toggle this preview and access data, need to provide a custom media type in the Accept header:
 | 
						|
		// MEMO: I tried to get the affected version via GitHub API. Bit it seems difficult to determin the affected version if there are multiple dependency files such as package.json.
 | 
						|
		// TODO remove this header if it is no longer preview status in the future.
 | 
						|
		req.Header.Set("Accept", "application/vnd.github.package-deletes-preview+json")
 | 
						|
		req.Header.Set("Content-Type", "application/json")
 | 
						|
 | 
						|
		resp, err := httpClient.Do(req)
 | 
						|
		if err != nil {
 | 
						|
			return 0, err
 | 
						|
		}
 | 
						|
		defer resp.Body.Close()
 | 
						|
 | 
						|
		body, err := io.ReadAll(resp.Body)
 | 
						|
		if err != nil {
 | 
						|
			return 0, err
 | 
						|
		}
 | 
						|
 | 
						|
		alerts := SecurityAlerts{}
 | 
						|
		if err := json.Unmarshal(body, &alerts); err != nil {
 | 
						|
			return 0, err
 | 
						|
		}
 | 
						|
 | 
						|
		// util.Log.Debugf("%s", pp.Sprint(alerts))
 | 
						|
		// util.Log.Debugf("%s", string(body))
 | 
						|
		if alerts.Data.Repository.URL == "" {
 | 
						|
			return 0, errof.New(errof.ErrFailedToAccessGithubAPI,
 | 
						|
				fmt.Sprintf("Failed to access to GitHub API. Response: %s", string(body)))
 | 
						|
		}
 | 
						|
 | 
						|
		for _, v := range alerts.Data.Repository.VulnerabilityAlerts.Edges {
 | 
						|
			if ignoreDismissed && v.Node.DismissReason != "" {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
 | 
						|
			pkgName := fmt.Sprintf("%s %s",
 | 
						|
				alerts.Data.Repository.URL, v.Node.SecurityVulnerability.Package.Name)
 | 
						|
 | 
						|
			m := models.GitHubSecurityAlert{
 | 
						|
				PackageName:   pkgName,
 | 
						|
				FixedIn:       v.Node.SecurityVulnerability.FirstPatchedVersion.Identifier,
 | 
						|
				AffectedRange: v.Node.SecurityVulnerability.VulnerableVersionRange,
 | 
						|
				Dismissed:     len(v.Node.DismissReason) != 0,
 | 
						|
				DismissedAt:   v.Node.DismissedAt,
 | 
						|
				DismissReason: v.Node.DismissReason,
 | 
						|
			}
 | 
						|
 | 
						|
			cveIDs, other := []string{}, []string{}
 | 
						|
			for _, identifier := range v.Node.SecurityAdvisory.Identifiers {
 | 
						|
				if identifier.Type == "CVE" {
 | 
						|
					cveIDs = append(cveIDs, identifier.Value)
 | 
						|
				} else {
 | 
						|
					other = append(other, identifier.Value)
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			// If CVE-ID has not been assigned, use the GHSA ID etc as a ID.
 | 
						|
			if len(cveIDs) == 0 {
 | 
						|
				cveIDs = other
 | 
						|
			}
 | 
						|
 | 
						|
			refs := []models.Reference{}
 | 
						|
			for _, r := range v.Node.SecurityAdvisory.References {
 | 
						|
				refs = append(refs, models.Reference{Link: r.URL})
 | 
						|
			}
 | 
						|
 | 
						|
			for _, cveID := range cveIDs {
 | 
						|
				cveContent := models.CveContent{
 | 
						|
					Type:          models.GitHub,
 | 
						|
					CveID:         cveID,
 | 
						|
					Title:         v.Node.SecurityAdvisory.Summary,
 | 
						|
					Summary:       v.Node.SecurityAdvisory.Description,
 | 
						|
					Cvss2Severity: v.Node.SecurityVulnerability.Severity,
 | 
						|
					Cvss3Severity: v.Node.SecurityVulnerability.Severity,
 | 
						|
					SourceLink:    v.Node.SecurityAdvisory.Permalink,
 | 
						|
					References:    refs,
 | 
						|
					Published:     v.Node.SecurityAdvisory.PublishedAt,
 | 
						|
					LastModified:  v.Node.SecurityAdvisory.UpdatedAt,
 | 
						|
				}
 | 
						|
 | 
						|
				if val, ok := r.ScannedCves[cveID]; ok {
 | 
						|
					val.GitHubSecurityAlerts = val.GitHubSecurityAlerts.Add(m)
 | 
						|
					val.CveContents[models.GitHub] = []models.CveContent{cveContent}
 | 
						|
					r.ScannedCves[cveID] = val
 | 
						|
				} else {
 | 
						|
					v := models.VulnInfo{
 | 
						|
						CveID:                cveID,
 | 
						|
						Confidences:          models.Confidences{models.GitHubMatch},
 | 
						|
						GitHubSecurityAlerts: models.GitHubSecurityAlerts{m},
 | 
						|
						CveContents:          models.NewCveContents(cveContent),
 | 
						|
					}
 | 
						|
					r.ScannedCves[cveID] = v
 | 
						|
				}
 | 
						|
				nCVEs++
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if !alerts.Data.Repository.VulnerabilityAlerts.PageInfo.HasNextPage {
 | 
						|
			break
 | 
						|
		}
 | 
						|
		after = fmt.Sprintf(`after: \"%s\"`, alerts.Data.Repository.VulnerabilityAlerts.PageInfo.EndCursor)
 | 
						|
	}
 | 
						|
	return nCVEs, err
 | 
						|
}
 | 
						|
 | 
						|
// SecurityAlerts has detected CVE-IDs, PackageNames, Refs
 | 
						|
type SecurityAlerts struct {
 | 
						|
	Data struct {
 | 
						|
		Repository struct {
 | 
						|
			URL                 string `json:"url"`
 | 
						|
			VulnerabilityAlerts struct {
 | 
						|
				PageInfo struct {
 | 
						|
					EndCursor   string `json:"endCursor"`
 | 
						|
					HasNextPage bool   `json:"hasNextPage"`
 | 
						|
					StartCursor string `json:"startCursor"`
 | 
						|
				} `json:"pageInfo"`
 | 
						|
				Edges []struct {
 | 
						|
					Node struct {
 | 
						|
						ID                    string    `json:"id"`
 | 
						|
						DismissReason         string    `json:"dismissReason"`
 | 
						|
						DismissedAt           time.Time `json:"dismissedAt"`
 | 
						|
						SecurityVulnerability struct {
 | 
						|
							Package struct {
 | 
						|
								Name      string `json:"name"`
 | 
						|
								Ecosystem string `json:"ecosystem"`
 | 
						|
							} `json:"package"`
 | 
						|
							Severity               string `json:"severity"`
 | 
						|
							VulnerableVersionRange string `json:"vulnerableVersionRange"`
 | 
						|
							FirstPatchedVersion    struct {
 | 
						|
								Identifier string `json:"identifier"`
 | 
						|
							} `json:"firstPatchedVersion"`
 | 
						|
						} `json:"securityVulnerability"`
 | 
						|
						SecurityAdvisory struct {
 | 
						|
							Description string    `json:"description"`
 | 
						|
							GhsaID      string    `json:"ghsaId"`
 | 
						|
							Permalink   string    `json:"permalink"`
 | 
						|
							PublishedAt time.Time `json:"publishedAt"`
 | 
						|
							Summary     string    `json:"summary"`
 | 
						|
							UpdatedAt   time.Time `json:"updatedAt"`
 | 
						|
							WithdrawnAt time.Time `json:"withdrawnAt"`
 | 
						|
							Origin      string    `json:"origin"`
 | 
						|
							Severity    string    `json:"severity"`
 | 
						|
							References  []struct {
 | 
						|
								URL string `json:"url"`
 | 
						|
							} `json:"references"`
 | 
						|
							Identifiers []struct {
 | 
						|
								Type  string `json:"type"`
 | 
						|
								Value string `json:"value"`
 | 
						|
							} `json:"identifiers"`
 | 
						|
						} `json:"securityAdvisory"`
 | 
						|
					} `json:"node"`
 | 
						|
				} `json:"edges"`
 | 
						|
			} `json:"vulnerabilityAlerts"`
 | 
						|
		} `json:"repository"`
 | 
						|
	} `json:"data"`
 | 
						|
}
 |